Difference between pages "DFXML Piecewise Hashing" and "Upcoming events"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(Calls For Papers)
 
Line 1: Line 1:
Digital Forensics XML can be used to represent the results of piecewise hashing of individual files.
+
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
 +
When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
 +
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
Here is an example:
+
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activities.  Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
  
 +
This listing is divided into three sections (described as follows):<br>
 +
<ol><li><b><u>[[Upcoming_events#Calls_For_Papers|Calls For Papers]]</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
 +
<li><b><u>[[Upcoming_events#Conferences|Conferences]]</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
 +
<li><b><u>[[Training Courses and Providers]]</u></b> - Training </li><br></ol>
  
<pre>
+
== Calls For Papers ==
<?xml version='1.0' encoding='UTF-8'?>
+
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
<md5deep>
+
<fileobject>
+
<filename>sample/bar.txt</filename>
+
<filesize>46</filesize>
+
<mtime format='time_t'>1296497502.0</mtime>
+
<byte_runs><run file_offset='0' len='46'><hashdigest type='MD5'>0e886f6b08986269af98aedde53df23f</hashdigest><hashdigest type='SHA256'>21c35b5698f1e54d11ca8a41321d40d75797425013dfa1b640ab34d7efa7f1ac</hashdigest></run>
+
</byte_runs>
+
<hashdigest type='MD5'>0e886f6b08986269af98aedde53df23f</hashdigest>
+
<hashdigest type='SHA256'>21c35b5698f1e54d11ca8a41321d40d75797425013dfa1b640ab34d7efa7f1ac</hashdigest>
+
</fileobject>
+
<fileobject>
+
<filename>sample/foo.txt</filename>
+
<filesize>193</filesize>
+
<mtime format='time_t'>1296497462.0</mtime>
+
<byte_runs><run file_offset='0' len='193'><hashdigest type='MD5'>06f63e03ed5e1770a2ff753a76d04906</hashdigest><hashdigest type='SHA256'>82a217a76ebe5e6c0f768576a3e8fd9ba6de504c42360c23e08ddfa22e711ba0</hashdigest></run>
+
</byte_runs>
+
<hashdigest type='MD5'>06f63e03ed5e1770a2ff753a76d04906</hashdigest>
+
<hashdigest type='SHA256'>82a217a76ebe5e6c0f768576a3e8fd9ba6de504c42360c23e08ddfa22e711ba0</hashdigest>
+
</fileobject>
+
<fileobject>
+
<filename>sample/somedir/baz.txt</filename>
+
<filesize>19</filesize>
+
<mtime format='time_t'>1296497486.0</mtime>
+
<byte_runs><run file_offset='0' len='19'><hashdigest type='MD5'>362aa248563e453588755f280387a3d4</hashdigest><hashdigest type='SHA256'>7a7c62947561b0b00c213d37d04edbe0c8de46282098b7216a23b25fa336f150</hashdigest></run>
+
</byte_runs>
+
<hashdigest type='MD5'>362aa248563e453588755f280387a3d4</hashdigest>
+
<hashdigest type='SHA256'>7a7c62947561b0b00c213d37d04edbe0c8de46282098b7216a23b25fa336f150</hashdigest>
+
</fileobject>
+
</md5deep>
+
</pre>
+
  
[[Category:Digital Forensics XML]]
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="30%|Title
 +
! width="15%"|Due Date
 +
! width="15%"|Notification Date
 +
! width="40%"|Website
 +
|-
 +
|CyberPatterns 2014
 +
|Jan 03, 2014
 +
|Jan 17, 2014
 +
|http://tech.brookes.ac.uk/CyberPatterns2014/CFPCyberpatterns2014.pdf
 +
|-
 +
|12th International Conference on Applied Cryptography and Network Security
 +
|Jan 10, 2014
 +
|Mar 14, 2014
 +
|http://acns2014.epfl.ch/callpapers.php
 +
|-
 +
|9th Annual Conference on Digital Forensics, Security and Law
 +
|Jan 15, 2014
 +
|
 +
|http://www.digitalforensics-conference.org/callforpapers.htm
 +
|-
 +
|2nd ACM Workshop on Information Hiding and Multimedia Security
 +
|Jan 17, 2014
 +
|Mar 31, 2014
 +
|http://www.ihmmsec.org/index.php/cfp
 +
|-
 +
|USENIX Annual Technical Conference
 +
|Jan 28, 2014
 +
|Apr 07, 2014
 +
|https://www.usenix.org/conference/atc14/call-for-papers
 +
|-
 +
|Audio Engineering Society (AES) Conference on Audio Forensics
 +
|Jan 31, 2014
 +
|Mar 15, 2014
 +
|http://www.aes.org/conferences/54/downloads/54thCallForContributions.pdf
 +
|-
 +
|DFRWS - USA 2014
 +
|Feb 13, 2014
 +
|Apr 07, 2014
 +
|http://dfrws.org/2014/cfp.shtml
 +
|-
 +
|Symposium On Usable Privacy and Security
 +
|Feb 28, 2014 (Register) / Mar 06, 2014 (Submit)
 +
|May 05, 2014
 +
|http://cups.cs.cmu.edu/soups/2014/cfp.html
 +
|-
 +
|6th International Conference on Digital Forensics & Cyber Crime
 +
|May 16, 2014
 +
|Jul 30, 2014
 +
|http://d-forensics.org/2014/show/cf-calls
 +
|-
 +
|}
 +
 
 +
See also [http://www.wikicfp.com/cfp/servlet/tool.search?q=forensics WikiCFP 'Forensics']
 +
 
 +
== Conferences ==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|IFIP WG 11.9 International Conference on Digital Forensics
 +
|Jan 08-10<br>Vienna, Austria
 +
|http://www.ifip119.org/Conferences/
 +
|-
 +
|AAFS 66th Annual Scientific Meeting
 +
|Feb 17-22<br>Seattle, WA, USA
 +
|http://www.aafs.org/aafs-66th-annual-scientific-meeting
 +
|-
 +
|21st Network & Distributed System Security Symposium
 +
|Feb 23-26<br>San Diego, CA, USA
 +
|http://www.internetsociety.org/events/ndss-symposium
 +
|-
 +
|Fourth ACM Conference on Data and Application Security and Privacy 2014
 +
|Mar 03-05<br>San Antonio, TX, USA
 +
|http://www1.it.utsa.edu/codaspy/
 +
|-
 +
|9th International Conference on Cyber Warfare and Security (ICCWS-2014)
 +
|Mar 24-25<br>West Lafayette, IN, USA
 +
|http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm
 +
|-
 +
|CyberPatterns 2014
 +
|Apr 11<br>Oxford, United Kingdom
 +
|http://tech.brookes.ac.uk/CyberPatterns2014/
 +
|-
 +
|US Cyber Crime Conference 2014
 +
|Apr 29-May 02<br>Leesburg, VA
 +
|http://www.usacybercrime.com/
 +
|-
 +
|DFRWS-Europe 2014
 +
|May 07-09<br>Amsterdam, Netherlands
 +
|http://dfrws.org/2014eu/index.shtml
 +
|-
 +
|8th International Conference on IT Security Incident Management & IT Forensics
 +
|May 12-14<br>Muenster, Germany
 +
|http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
 +
|-
 +
|2014 IEEE Symposium on Security and Privacy
 +
|May 16-23<br>Berkley, CA, USA
 +
|http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
 +
|-
 +
|9th ADFSL Conference on Digital Forensics, Security and Law
 +
|May 28-29<br>Richmond, VA
 +
|http://www.digitalforensics-conference.org/
 +
|-
 +
|Techno-Security and Forensics Conference
 +
|Jun 01-04<br>Myrtle Beach, SC, USA
 +
|http://www.techsec.com/html/Security%20Conference%202014.html
 +
|-
 +
|Mobile Forensics World
 +
|Jun 01-04<br>Myrtle Beach, SC, USA
 +
|http://www.techsec.com/html/MFC-2014-Spring.html
 +
|-
 +
|12th International Conference on Applied Cryptography and Network Security
 +
|Jun 10-13<br>Lausanne, Switzerland
 +
|http://acns2014.epfl.ch/
 +
|-
 +
|2nd ACM Workshop on Information Hiding and Multimedia Security
 +
|Jun 11-13<br>Salzburg, Austria
 +
|http://www.ihmmsec.org/
 +
|-
 +
|54th Conference on Audio Forensics
 +
|Jun 12-14<br>London, England
 +
|http://www.aes.org/conferences/54/
 +
|-
 +
|2014 USENIX Annual Technical Conference
 +
|Jun 19-20<br>Philadelphia, PA, USA
 +
|https://www.usenix.org/conference/atc14
 +
|-
 +
|44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
 +
|Jun 23-26<br>Atlanta, GA, USA
 +
|http://www.dsn.org/
 +
|-
 +
|Symposium On Usable Privacy and Security (SOUPS) 2014
 +
|Jul 09-11<br>Menlo Park, CA, USA
 +
|http://cups.cs.cmu.edu/soups/2014/
 +
|-
 +
|Black Hat USA 2014
 +
|Aug 02-07<br>Las Vegas, NV, USA
 +
|https://www.blackhat.com
 +
|-
 +
|DFRWS 2014
 +
|Aug 03-06<br>Denver, CO, USA
 +
|http://dfrws.org/2014/index.shtml
 +
|-
 +
|RCFG GMU 2014
 +
|Aug 04-08<br>Fairfax, VA, USA
 +
|http://www.rcfg.org/gmu/
 +
|-
 +
|23rd USENIX Security Symposium
 +
|Aug 20-22<br>San Diego, CA, USA
 +
|https://www.usenix.org/conferences
 +
|-
 +
|2014 HTCIA International Conference & Training Expo
 +
|Aug 25-27<br>Austin, TX
 +
|http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
 +
|-
 +
|25th Annual Conference & Digital Multimedia Evidence Training Symposium
 +
|Oct 06-10<br>Coeur d’Alene, ID, USA
 +
|http://www.leva.org/annual-training-conference/
 +
|-
 +
|}
 +
 
 +
==See Also==
 +
* [[Training Courses and Providers]]
 +
==References==
 +
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
 +
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
 +
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]

Revision as of 08:28, 23 January 2014

PLEASE READ BEFORE YOU EDIT THE LISTS BELOW
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).
Some events may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

This is a BY DATE listing of upcoming events relevant to digital forensics. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic conferences page, but entries in this list have specific dates and locations for the upcoming event.

This listing is divided into three sections (described as follows):

  1. Calls For Papers - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)

  2. Conferences - Conferences relevant for Digital Forensics (Name, Date, Location, URL)

  3. Training Courses and Providers - Training

Calls For Papers

Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.

Title Due Date Notification Date Website
CyberPatterns 2014 Jan 03, 2014 Jan 17, 2014 http://tech.brookes.ac.uk/CyberPatterns2014/CFPCyberpatterns2014.pdf
12th International Conference on Applied Cryptography and Network Security Jan 10, 2014 Mar 14, 2014 http://acns2014.epfl.ch/callpapers.php
9th Annual Conference on Digital Forensics, Security and Law Jan 15, 2014 http://www.digitalforensics-conference.org/callforpapers.htm
2nd ACM Workshop on Information Hiding and Multimedia Security Jan 17, 2014 Mar 31, 2014 http://www.ihmmsec.org/index.php/cfp
USENIX Annual Technical Conference Jan 28, 2014 Apr 07, 2014 https://www.usenix.org/conference/atc14/call-for-papers
Audio Engineering Society (AES) Conference on Audio Forensics Jan 31, 2014 Mar 15, 2014 http://www.aes.org/conferences/54/downloads/54thCallForContributions.pdf
DFRWS - USA 2014 Feb 13, 2014 Apr 07, 2014 http://dfrws.org/2014/cfp.shtml
Symposium On Usable Privacy and Security Feb 28, 2014 (Register) / Mar 06, 2014 (Submit) May 05, 2014 http://cups.cs.cmu.edu/soups/2014/cfp.html
6th International Conference on Digital Forensics & Cyber Crime May 16, 2014 Jul 30, 2014 http://d-forensics.org/2014/show/cf-calls

See also WikiCFP 'Forensics'

Conferences

Title Date/Location Website
IFIP WG 11.9 International Conference on Digital Forensics Jan 08-10
Vienna, Austria
http://www.ifip119.org/Conferences/
AAFS 66th Annual Scientific Meeting Feb 17-22
Seattle, WA, USA
http://www.aafs.org/aafs-66th-annual-scientific-meeting
21st Network & Distributed System Security Symposium Feb 23-26
San Diego, CA, USA
http://www.internetsociety.org/events/ndss-symposium
Fourth ACM Conference on Data and Application Security and Privacy 2014 Mar 03-05
San Antonio, TX, USA
http://www1.it.utsa.edu/codaspy/
9th International Conference on Cyber Warfare and Security (ICCWS-2014) Mar 24-25
West Lafayette, IN, USA
http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm
CyberPatterns 2014 Apr 11
Oxford, United Kingdom
http://tech.brookes.ac.uk/CyberPatterns2014/
US Cyber Crime Conference 2014 Apr 29-May 02
Leesburg, VA
http://www.usacybercrime.com/
DFRWS-Europe 2014 May 07-09
Amsterdam, Netherlands
http://dfrws.org/2014eu/index.shtml
8th International Conference on IT Security Incident Management & IT Forensics May 12-14
Muenster, Germany
http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
2014 IEEE Symposium on Security and Privacy May 16-23
Berkley, CA, USA
http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
9th ADFSL Conference on Digital Forensics, Security and Law May 28-29
Richmond, VA
http://www.digitalforensics-conference.org/
Techno-Security and Forensics Conference Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/Security%20Conference%202014.html
Mobile Forensics World Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/MFC-2014-Spring.html
12th International Conference on Applied Cryptography and Network Security Jun 10-13
Lausanne, Switzerland
http://acns2014.epfl.ch/
2nd ACM Workshop on Information Hiding and Multimedia Security Jun 11-13
Salzburg, Austria
http://www.ihmmsec.org/
54th Conference on Audio Forensics Jun 12-14
London, England
http://www.aes.org/conferences/54/
2014 USENIX Annual Technical Conference Jun 19-20
Philadelphia, PA, USA
https://www.usenix.org/conference/atc14
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Jun 23-26
Atlanta, GA, USA
http://www.dsn.org/
Symposium On Usable Privacy and Security (SOUPS) 2014 Jul 09-11
Menlo Park, CA, USA
http://cups.cs.cmu.edu/soups/2014/
Black Hat USA 2014 Aug 02-07
Las Vegas, NV, USA
https://www.blackhat.com
DFRWS 2014 Aug 03-06
Denver, CO, USA
http://dfrws.org/2014/index.shtml
RCFG GMU 2014 Aug 04-08
Fairfax, VA, USA
http://www.rcfg.org/gmu/
23rd USENIX Security Symposium Aug 20-22
San Diego, CA, USA
https://www.usenix.org/conferences
2014 HTCIA International Conference & Training Expo Aug 25-27
Austin, TX
http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
25th Annual Conference & Digital Multimedia Evidence Training Symposium Oct 06-10
Coeur d’Alene, ID, USA
http://www.leva.org/annual-training-conference/

See Also

References