<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=ks_c_5601-1987">
<META content="MSHTML 6.00.2900.3562" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>Apologies for cross-postings. Please send to interested
colleagues and<BR>students</FONT></DIV>
<DIV> </DIV><FONT size=2>
<DIV><BR>===========F2GC-09 CALL FOR PAPERS
============================================</DIV>
<DIV> </DIV>
<DIV>
The 2nd International Workshop on <BR>Forensics for Future Generation
Communication environments (F2GC-09) </DIV>
<DIV> </DIV>
<DIV>
December 10 ~ 12, 2009, Jeju, Korea. </DIV>
<DIV> </DIV>
<DIV>
<A href="http://www.ftrg.org/F2GC2009/">http://www.ftrg.org/F2GC2009/</A></DIV>
<DIV> </DIV>
<DIV>
In Conjunction with CSA 2009</DIV>
<DIV> </DIV>
<DIV>
(<A href="http://www.ftrg.org/CSA2009">http://www.ftrg.org/CSA2009</A>)</DIV>
<DIV> </DIV>
<DIV>==========================================================================</DIV>
<DIV> </DIV>
<DIV>Future Generation Communication environments (FGC) are advanced
communication and networking environments <BR>where all applications and
services are focused on users. In addition, the FGC has emerged rapidly an
exciting new<BR>paradigm to provide reliable and comfortable life services.
Furthermore, the benefits of FGC will only be realized if <BR>security issues
can be appropriately addressed. Specially, forensics for FGC is very important
in the security fields.</DIV>
<DIV> </DIV>
<DIV> This workshop is intended to foster state-of-the-art research
forensics in the area of FGC including information and<BR>communication
technologies, law, social sciences and business administration.</DIV>
<DIV> </DIV>
<DIV> The F2GC-09 will provide an opportunity for academic and industry
professionals to discuss the latest issues and<BR>progress in the area of
forensics. And the workshop will publish high quality papers which are closely
related to<BR>the various theories and practical applications in F2GC.
Furthermore, we expect that the workshop and its publications<BR>will be a
trigger for further related research and technology improvements in this
important subject.</DIV>
<DIV> </DIV>
<DIV><BR>== Topics ==</DIV>
<DIV> </DIV>
<DIV>Topics of interest include but are not limited to following:</DIV>
<DIV> </DIV>
<DIV>Digital forensics tools in FGC</DIV>
<DIV> </DIV>
<DIV>Digital Evidence Management in FGC</DIV>
<DIV> </DIV>
<DIV>Digital Evidence Analytics in FGC</DIV>
<DIV> </DIV>
<DIV>Digital Forensics Surveillance Technology and Procedures in FGC</DIV>
<DIV> </DIV>
<DIV>Digital evidence visualisation and communication for FGC</DIV>
<DIV> </DIV>
<DIV>Digital evidence storage and preservation in FGC</DIV>
<DIV> </DIV>
<DIV>Incident response and investigation in FGC</DIV>
<DIV> </DIV>
<DIV>Forensic procedures in FGC</DIV>
<DIV> </DIV>
<DIV>Portable electronic device forensics for FGC</DIV>
<DIV> </DIV>
<DIV>Network forensics in FGC</DIV>
<DIV> </DIV>
<DIV>Data hiding and recovery in FGC</DIV>
<DIV> </DIV>
<DIV>Network traffic analysis, traceback and attribution in FGC</DIV>
<DIV> </DIV>
<DIV>Legal, ethical and policy issues related to digital forensics in FGC</DIV>
<DIV> </DIV>
<DIV>Integrity of digital evidence and live investigations </DIV>
<DIV> </DIV>
<DIV>Multimedia analysis in FGC</DIV>
<DIV> </DIV>
<DIV>Trends and Challenges for FGC</DIV>
<DIV> </DIV>
<DIV>Evidence Protection in FGC</DIV>
<DIV> </DIV>
<DIV>Forensics case studies in FGC</DIV>
<DIV> </DIV>
<DIV><BR>== Organization===</DIV>
<DIV> </DIV>
<DIV>Steering Chairs </DIV>
<DIV> </DIV>
<DIV>-------------------</DIV>
<DIV> </DIV>
<DIV> Jong Hyuk Park (Kyungnam University, Korea) </DIV>
<DIV> </DIV>
<DIV> Stefanos Gritzalis (University of the Aegean,
Greece) </DIV>
<DIV> </DIV>
<DIV><BR>General Chairs</DIV>
<DIV> </DIV>
<DIV>------------------ </DIV>
<DIV> </DIV>
<DIV> Ryoichi Sasaki (Tokyo Denki University, Japan) </DIV>
<DIV> </DIV>
<DIV> Jeng-Shyang Pan (National Kaohsiung University of Applied
Sciences, Taiwan) </DIV>
<DIV> </DIV>
<DIV><BR>Program Chairs</DIV>
<DIV> </DIV>
<DIV>------------------------ -</DIV>
<DIV> </DIV>
<DIV> Jongsung Kim (Korea Universtiy, Korea)
</DIV>
<DIV> </DIV>
<DIV> K.P. Chow (University of Hongkong, Hongkong) </DIV>
<DIV> </DIV>
<DIV><BR>International Advisory Board</DIV>
<DIV> </DIV>
<DIV>----------------------------- </DIV>
<DIV> </DIV>
<DIV> Kyo-il Chung (ETRI, Korea) </DIV>
<DIV> </DIV>
<DIV> Jung-Shian Li (National Cheng Kung University, Taiwan) </DIV>
<DIV> </DIV>
<DIV> Patrick Wang (Northeastern University, USA)</DIV>
<DIV> </DIV>
<DIV> Bart Preneel (Katholieke Universiteit Leuven,
Belgium) </DIV>
<DIV> </DIV>
<DIV><BR>Publicity Chairs</DIV>
<DIV> </DIV>
<DIV>------------------------</DIV>
<DIV> </DIV>
<DIV>Deok Gyu Lee (ETRI, Korea)</DIV>
<DIV> </DIV>
<DIV>Bo-Chao Cheng (National Chung Cheng University, Taiwan)</DIV>
<DIV> </DIV>
<DIV>Antonio Savoldi (University of Brescia, Italy)</DIV>
<DIV> </DIV>
<DIV><BR>Program Committee </DIV>
<DIV> </DIV>
<DIV>------------------------------</DIV>
<DIV> </DIV>
<DIV>Zeno Geradts (The Netherlands Forensic Institute, Netherlands) </DIV>
<DIV> </DIV>
<DIV>Ahmed Bouridane (Queen's University Belfast, UK) </DIV>
<DIV> </DIV>
<DIV>Tzong-Chen Wu (National Taiwan University of Science & Technology,
Taiwan) </DIV>
<DIV> </DIV>
<DIV>Der-Tsai Lee (Institute of Information Science Academia Sinica, Taiwan)
</DIV>
<DIV> </DIV>
<DIV>LF Kwok (City University of Hong Kong, Hong Kong) </DIV>
<DIV> </DIV>
<DIV>Damien Sauveron (University of Limoges, France) </DIV>
<DIV> </DIV>
<DIV>Edgar R. Weippl (Vienna University of Technology, Austria) </DIV>
<DIV> </DIV>
<DIV>Robert Erbacher (Utah State University, USA) </DIV>
<DIV> </DIV>
<DIV>Raymond Hsieh (California University of Pennsylvania, USA) </DIV>
<DIV> </DIV>
<DIV>Kyung-Hyune Rhee (Pukyong National University,Korea) </DIV>
<DIV> </DIV>
<DIV>Paris Kitsos (Hellenic Open University, Greece) </DIV>
<DIV> </DIV>
<DIV>Cosimo Anglano (Universita' del Piemonte Orientale, Italy) </DIV>
<DIV> </DIV>
<DIV>Phil Attfield (Northwest Security,Institute-USA, Canada) </DIV>
<DIV> </DIV>
<DIV>Jinn-Shing Cheng (National Kaohsiung First University, Taiwan) </DIV>
<DIV> </DIV>
<DIV>Yongjian Hu (Korea Advanced Institute of Science and Technology,
Korea) </DIV>
<DIV> </DIV>
<DIV>Tetsutaro Uehara (Kyoto University, Japan) </DIV>
<DIV> </DIV>
<DIV>Sujeet Shenoi (University of Tulsa, USA) </DIV>
<DIV> </DIV>
<DIV>Golden G. Richard (University of New Orleans, USA) </DIV>
<DIV> </DIV>
<DIV>Jung-Shian Li (National Cheng Kung University, Taiwan) </DIV>
<DIV> </DIV>
<DIV>Che-Yen Wen (Central Police University, Taiwan) </DIV>
<DIV> </DIV>
<DIV>Katrin Franke (Fraunhofer Institute, Germany) </DIV>
<DIV> </DIV>
<DIV>Kyung-Soo Lim (Korea University, Korea) </DIV>
<DIV> </DIV>
<DIV>Yong Guan (Iowa State University, USA) </DIV>
<DIV> </DIV>
<DIV>Jill Salay (University of South Australia, Australia) </DIV>
<DIV> </DIV>
<DIV>George Mohay (Queensland University of Technology, Australia) </DIV>
<DIV> </DIV>
<DIV>Richard Overill (King's College London, UK) </DIV>
<DIV> </DIV>
<DIV>Hilton Chan (Hong Kong University of Science and Technology, Hong
Kong) </DIV>
<DIV> </DIV>
<DIV>S.M. Yiu (University of Hong Kong, Hong Kong) </DIV>
<DIV> </DIV>
<DIV>Zichen Li (Bejing Electronic Science Technology Institute, China)
</DIV>
<DIV> </DIV>
<DIV>Yang Ying (Shandong Computer Science Center, China) </DIV>
<DIV> </DIV>
<DIV><BR>==Important Dates== </DIV>
<DIV> </DIV>
<DIV>Submission due: July 17, 2009</DIV>
<DIV> </DIV>
<DIV>Acceptance notification: August 31, 2009</DIV>
<DIV> </DIV>
<DIV>Camera-ready due: August September 15, 2009</DIV>
<DIV> </DIV>
<DIV>Conference: December 10 - 12, 2009</DIV>
<DIV> </DIV>
<DIV><BR>== Paper Submission==</DIV>
<DIV> </DIV>
<DIV> Prospective authors are invited, in the first instance, to submit
papers for oral presentation in any of the areas of interest for this
conference. The initial submission for evaluation should be in the form of a
6-10 page paper outline. Authors are strongly recommended to submit the full 10
pages English language version. Authors should submit full paper with 10 pages
and regular paper with 6 pages by using online systems for review. Conference
Proceedings will be published by IEEE (Pendig). Please use the IEEE CS
Proceedings format (MS-WORD or LaTeX) for submission. </DIV>
<DIV> </DIV>
<DIV>F2GC-09's submission web site : <A
href="http://www.editorialsystem.net/em-com2009">http://www.editorialsystem.net/em-com2009</A></DIV>
<DIV> </DIV>
<DIV>Authors of accepted papers, or at least one of them, are requested to
register and present their work at the workshop, otherwise their papers will be
removed from the digital library after the conference. </DIV>
<DIV> </DIV>
<DIV><BR>== Proceeding ==</DIV>
<DIV> </DIV>
<DIV>Accepted papers will be published by IEEE. In addition, distinguished
papers accepted and presented in F2GC-09, after further revisions, will be
published in special issues of prestigious international journals
(Pending). </DIV>
<DIV> </DIV>
<DIV>--- The End --<BR> </FONT></DIV></BODY></HTML>