START Conference Manager    

4th International Conference on IT-Incident Management and IT-Forensics

IMF 2008

Submission Page

To revise a previous submission, please type in its passcode below, and press the ENTER button.


If you lost the passcode for your submission, please click HERE.

To make a new submission, please fill in the form below, and then press the submit button at the bottom.

Important: IMF 2008 is running a blind review process. In preparing your manuscript, do not include any information which could reveal your identity, or that of your co-authors. The title section of your manuscript should not contain any author names, email addresses, or affiliation status. If you do include any author names on the title page, your submission will be automatically rejected. In the body of your submission, you should eliminate all direct references to your own previous work. That is, avoid phrases such as "this contribution generalizes our results for XYZ". Also, please do not disproportionately cite your own previous work. In other words, make your submission as anonymous as possible. We need your cooperation in our effort to maintain a fair, blind reviewing process - and to consider all submissions equally.

Title of Submission:  

List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Affiliation

More Authors      Fewer Authors

Contact Information:

First name*
Last name*
       Affiliation Dept/Lab 
Zip/Postal Code*

Submission Category:

Please enter the category under which the submission should be reviewed.

Submission Type:  


Type (or cut-and-paste) a short ASCII abstract for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 1000 words.


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

Purposes of IT-Incident Management
Trends, Processes and Methods within IT-Incident Management
Formats and Standardization in the IT-Incident Management
Tools for the IT-Incident Management
Education and Training in the field of IT-Incident Management Awareness
Determination, Detection and Evaluation of Incidents and Sensors
Procedures for Handling Incidents
Problems and Challenges while establishing CERTs/ CSIRTs
Sources of Information/ Information Exchange/ Communities
Dealing with Vulnerabilities (vulnerability response)
Current Threats
Early Warning System
Organizations (Nat. CERT-Associations, FIRST, TERENA/ TI, TF-CSIRT, etc.)
Trends and Challenges within IT-Forensics
Methods, Processes and Applications for IT-Forensics (Networks, Operating Systems, Storage Media, ICT-Systems etc.)
Evidence Protection in IT-Environments
Standardization of Evidence Protection Processes
Data Protection- and other legal implications for IT-Forensic Investigations
Methods in Investigations
Legal Relevance of IT-Forensics
Tools for IT-Forensics
IT-Forensic readiness

(Note: Javascript must be enabled to make a submission.)

START Conference Manager (V2.61.0 - Rev. 4008)