Dynamic Forensics Evaluation and Training (DFET)

06/01/2014 - 05/01/2016

project image
Dynamic Forensics Evaluation and Training (DFET) will create new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the development of a virtual (cloud-based) cybercrime training environment to include real life simulation and scenario analysis. It thus aims to improve crime detection rates by providing scenario-based training in line with the dynamic nature of cybercrime. 

The community cloud based nature of DFET will promote and support knowledge exchange and the sharing of best practice between Member States across judicial authorities, the private sector and academia in a manageable form, allowing stakeholders to add their own specialist training scenarios while providing for IP protection of digital content. The virtualised infrastructure of DFET will support the automated creation, delivery and assessment of dynamic investigation challenges, equipping a range of target beneficiaries (from academia to law enforcement professionals) with the skills to address the evolving nature of cybercrime at a Europe-wide level. 

This approach is in synergy with ISEC’s objectives to promote and develop co-operation and mutual understanding among law enforcement agencies, academia and the private sector to stimulate, promote and develop training tools to strategically prevent and fight cybercrime, and reduce the impact of cybercrime on all citizens and related economic effects.
Dynamic Forensics Evaluation and Training (DFET) is a EU Framework Programmes project funded by EU. Carried out in collaboration with and others. For further information please refer to http://www.d-fet.eu/.
[Read More]

Related Projects

  • Symposium on Cyber Security
    Aim and Scope of Symposium This symposium aims to bring together knowledge from many different domains in order to create knowledge exchange and collaborative infrastructures, which address the key cyber risks that Scotland and the UK faces.
  • Digital Investigator
    The focus of this course is to provide a foundation in investigating network-based crimes, and in proactive methods that can be used to assess network-based threats. The course is structured in five key areas, and will re-enforce knowledge, building up to a final large-scale investigation.
  • Fragment Finder
  • vSOC - KTP
  • Next-generation Threat Detection KTP
next prev

Areas of Expertise link icon

  • Cyber-Security
    Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.
next prev

Project Team

Jamie Brogan
Affiliate Consultant
+44 131 455 3211/07714 332082
Marian Dunbar
+44 131 455 2711
Alistair Lawson
Associate Professor (Reader)
+44 131 455 2730
Bruce Ramsay
Senior Research Fellow
+44 131 455 2746
William Buchanan
Director of CDCS
+44 131 455 2759
Lu Fan
Senior Research Fellow
+44 131 455 2438
Richard Macfarlane
+44 131 455 2335
Adrian Smales
Research Fellow
+44 131 455

Associated Publications

Buchanan, W. (2015, ). Advanced Persistent Threat and Insiders. Paper presented at Advanced Persistent Threat, London.

Buchanan, W. (2015, ). Apple and Starbucks could have avoided being hacked if they'd taken this simple step. The Conversation, .

Buchanan, W. (2015, June). Cyber security challenges for cloud based services. Paper presented at Scot-Cloud 2015, Dynamic Earth, Edinburgh.

Buchanan, W., Ramsay, B., Macfarlane, R., Smales, A., keane, e., callahan, c., Blazic, B., Popov, O. (2015, August). Evaluation of the DFET Cloud. Paper presented at Cybercrime Forensics Education and Training (CFET) conference, Canterbury.

Buchanan, W. (2015, April). Identifying areas of vulnerability. Paper presented at Scot-secure 2015, Dynamic Earth, Edinburgh.

Buchanan, W. (2015, Jan 22). If Obama is talking about securing the net, it should be on everyone else’s lips too. The Conversation, .

See all publications