| |||||||||||||||
CFATI3 2021 : 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies | |||||||||||||||
Link: https://cfati3.conceptechint.net/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies (CFATI3 2021)
Cyber forensics and threat investigations has rapidly emerged as a new field of research to provide the key elements for maintaining security, reliability, and trustworthy of the next generation of emerging technologies such as the internet of things, cyber-physical systems, cloud/edge/fog computing, software-defined network, and network function virtualization. Complicated efforts are required in suitable and timely manners against any threats detected within these systems. Moreover, new frameworks are required to collect and preserve potential evidential data in suitable and timely manners as well. To guarantee proper cyber-defenses and strategies against the expanding landscape of criminal activities as well as rapidly advancing emerging technologies.. The major motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging technologies to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest. CFATI3 2021 is a virtual workshop that will be held on the 13 of September 2021. Important Dates: May 30, 2021 Papers Submission Due: July 8, 2021 Final Manuscript Due: July 22, 2021 WebSite : https://cfati3.conceptechint.net This Year Keynote: TBD Scope of The Workshop: Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked systems and services in emerging technologies (such as the ones can be found in cyber-physical systems and Internet of things, cloud/edge/fog computing, software-defined network, and network function virtualization). Topics include (but are not limited to): - Forensics and threat investigations in IoT - Forensics and threat investigations in peer-to-peer, and social networks - Forensics and threat investigations in SDN/NFV - Forensics and threat investigations in Cloud Computing - Forensics and threat investigations in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities) - Dark Web Investigations, Forensics, and Monitoring - Forensics and threat investigations in Virtual private networks - Security and Privacy in Clouds, Fog Computing, and 5G, and 6G - Security and Privacy in IoT, SDN/NFV, and Edge Computing - Security and Privacy in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities) - Forensics and visualization of Big Data - Trusted Computing in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities) - Tools and services for cyber forensics and threat investigations OSINT (Open Source Intelligence) - Cooperative and distributed forensics and threat investigations - Advanced threat investigations, forensic and anti-forensic techniques - Attack detection, traceback and attribution in Emerging Technologies - Malware Analysis and Attribution - Digital Evidence Extraction/Analysis using Artificial intelligence, Machine Learning and Data Mining - Data exfiltration techniques from networked devices and services (e.g. cyber-physical systems, and Internet-of-Things) - Methods for reconstruction of Digital Evidence in Emerging Technologies - Forensics and threat investigations in E-health/M-health - Vulnerability & threat detection and mitigation techniques for networked services - Novel large-scale investigations and Machine Learning techniques to analyze intelligence data sets and logs We also encourage contributions describing innovative work in the realm of cybersecurity, cyber defense, and digital crimes. Submission Paper submissions must present original, research or experiences. Late-breaking advances and work-in-progress reports from ongoing research are also encouraged. Only original papers that have not been published or submitted for publication elsewhere can be submitted. Also extended versions of conference or workshop papers that are already published may be considered as long as the additional contribution is at least 30% new content from the original. Each submission must be written in English, accompanied by a 75 to 200 word abstract and a list of up to 5 keywords. There is a length limitation of 6 A4 (210 mm x 297 mm) pages for full papers (including title, abstract, figures, tables) plus 1 page for references. Submissions must be in 2-column IEEE conference style with a minimum font size of 10 pt. Papers exceeding these limits, multiple submissions, and self-plagiarized papers will be rejected without further review. Authors should submit their papers electronically via the EasyChair online submission system under the following link: . The submission processes will be managed by easychair.org. If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking “I have no EasyChair account” button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system. Publication Selected papers presented at the workshop, after further revision, will have the opportunity to be published in special issues in indexed and/or high impact factor journals (details on the website). Organizing Committee Workshop Program Chair John William Walker, Nottingham Trent University, United Kingdom. Ahmed Elmesiry, University of South Wales, United Kingdom Workshop Coordinator Mamoun Qasem, University of South Wales, United Kingdom Technical Program Committee Yucel Saygin, Sabancı University, Turkey Ali Jwaid, De Montfort University, United Kingdom Karima Boudaoud, University of Nice Sophia Antipolis, France Dmitri Botvich, Waterford Institute of Technology, Ireland Mohammed Saad, Nottingham Trent University, United Kingdom Mohamed Aborizka, Arab Academy for Science, Technology, Egypt. Main Contact: If you have any further questions please contact the workshop organizers via https://cfati3.conceptechint.net/contact-us.html |
|