posted by user: Concet || 721 views || tracked by 2 users: [display]

CFATI3 2021 : 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies

FacebookTwitterLinkedInGoogle

Link: https://cfati3.conceptechint.net/
 
When Sep 13, 2021 - Sep 16, 2021
Where Lübeck, Germany
Submission Deadline May 30, 2021
Notification Due Jul 8, 2021
Final Version Due Jul 22, 2021
Categories    cybersecurity   digital forensics   incident response   threat investigations
 

Call For Papers

1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies (CFATI3 2021)

Cyber forensics and threat investigations has rapidly emerged as a new field of research to provide the key elements for maintaining security, reliability, and trustworthy of the next generation of emerging technologies such as the internet of things, cyber-physical systems, cloud/edge/fog computing, software-defined network, and network function virtualization. Complicated efforts are required in suitable and timely manners against any threats detected within these systems. Moreover, new frameworks are required to collect and preserve potential evidential data in suitable and timely manners as well. To guarantee proper cyber-defenses and strategies against the expanding landscape of criminal activities as well as rapidly advancing emerging technologies..

The major motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging technologies to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest.

CFATI3 2021 is a virtual workshop​ that will be held on the 13 of September 2021.

Important Dates: May 30, 2021

​Papers Submission Due: July 8, 2021

Final Manuscript Due: July 22, 2021

WebSite : https://cfati3.conceptechint.net

This Year Keynote:
TBD

Scope of The Workshop: ​
Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked systems and services in emerging technologies (such as the ones can be found in cyber-physical systems and Internet of things, cloud/edge/fog computing, software-defined network, and network function virtualization). Topics include (but are not limited to):

- Forensics and threat investigations in IoT
- Forensics and threat investigations in peer-to-peer, and social networks
- Forensics and threat investigations in SDN/NFV
- Forensics and threat investigations in Cloud Computing
- Forensics and threat investigations in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Dark Web Investigations, Forensics, and Monitoring
- Forensics and threat investigations in Virtual private networks
- Security and Privacy in Clouds, Fog Computing, and 5G, and 6G
- Security and Privacy in IoT, SDN/NFV, and Edge Computing
- Security and Privacy in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Forensics and visualization of Big Data
- Trusted Computing in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Tools and services for cyber forensics and threat investigations
OSINT (Open Source Intelligence)
- Cooperative and distributed forensics and threat investigations
- Advanced threat investigations, forensic and anti-forensic techniques
- Attack detection, traceback and attribution in Emerging Technologies
- Malware Analysis and Attribution
- Digital Evidence Extraction/Analysis using Artificial intelligence, Machine Learning and Data Mining
- Data exfiltration techniques from networked devices and services (e.g. cyber-physical systems, and Internet-of-Things)
- Methods for reconstruction of Digital Evidence in Emerging Technologies
- Forensics and threat investigations in E-health/M-health
- Vulnerability & threat detection and mitigation techniques for networked services
- Novel large-scale investigations and Machine Learning techniques to analyze intelligence data sets and logs

We also encourage contributions describing innovative work in the realm of cybersecurity, cyber defense, and digital crimes.

Submission

Paper submissions must present original, research or experiences. Late-breaking advances and work-in-progress reports from ongoing research are also encouraged. Only original papers that have not been published or submitted for publication elsewhere can be submitted. Also extended versions of conference or workshop papers that are already published may be considered as long as the additional contribution is at least 30% new content from the original. Each submission must be written in English, accompanied by a 75 to 200 word abstract and a list of up to 5 keywords. There is a length limitation of 6 A4 (210 mm x 297 mm) pages for full papers (including title, abstract, figures, tables) plus 1 page for references. Submissions must be in 2-column IEEE conference style with a minimum font size of 10 pt. Papers exceeding these limits, multiple submissions, and self-plagiarized papers will be rejected without further review. Authors should submit their papers electronically via the EasyChair online submission system under the following link: .

The submission processes will be managed by easychair.org. If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking “I have no EasyChair account” button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system.

Publication

Selected papers presented at the workshop, after further revision, will have the opportunity to be published in special issues in indexed and/or high impact factor journals (details on the website).

Organizing Committee
Workshop Program Chair

John William Walker, Nottingham Trent University, United Kingdom.

Ahmed Elmesiry, University of South Wales, United Kingdom

Workshop Coordinator

Mamoun Qasem, University of South Wales, United Kingdom

Technical Program Committee

Yucel Saygin, Sabancı University, Turkey

Ali Jwaid, De Montfort University, United Kingdom

Karima Boudaoud, University of Nice Sophia Antipolis, France

Dmitri Botvich, Waterford Institute of Technology, Ireland

Mohammed Saad, Nottingham Trent University, United Kingdom​

Mohamed Aborizka, Arab Academy for Science, Technology, Egypt.

Main Contact:
If you have any further questions please contact the workshop organizers via https://cfati3.conceptechint.net/contact-us.html

Related Resources

SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
Virtual Environments for Cybersecurity 2021   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''
SI on AdCTI 2021   Special Issue on Advances in Cyber Threat Intelligence, Security and Communication Networks, Wiley & Hindawi
SI-D2CSCAI 2021   CfP - Special Issue Data-Driven Cybersecurity and Safety for Critical Applications and Infrastructures (MDPI Sensors - IF= 3.275)
BDACCIP 2021   The 5th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention 2021
SP 2022   8th International Conference on Signal Processing (SP 2022)
ADRW 2021   «Archives during rebellions and wars». From the age of Napoleon to the cyber war era
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
Privacy Symposium 2022   Privacy Symposium - International Conference on Data Protection Regulations, Compliance and Innovative Technologies