Call: CFATI 2021
Event Details
Call for Papers: 1st International Workshop on Cyber Forensics and
Advanced Threat Investigations in Emerging Technologies (CFATI 2021)
in conjunction with the 5th International Conference on Networked
Systems (Netsys 2021) September 13- 16 2021, Lübeck, Germany
https://urldefense.proofpoint.com/v2/url?u=https-3A__cfati3.conceptechint.net&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=7E1n-qddUmSgdGzH43SL6J52gwDvJLOPpx7CNzRBPIc&e=
********************
Scope of the workshop:
********************
The main motivation for this Workshop is to bring together researchers
and practitioners working on cyber forensics and threat investigations
for emerging technologies to disseminate current research issues and
advances. Original technical papers describing new, state-of-the-art
research, will be considered. The Workshop welcomes submissions that
evaluate existing research results by reproducing experiments.
The aim of this workshop is to provide insight for the discussion of
the major research challenges and achievements on various topics of
interest. Papers on practical as well as on theoretical topics and
problems in various topics related to cyber forensics and threat
investigations are invited, with special emphasis on novel techniques
and tools to collect data from networked devices and services in
emerging networks (such as the ones that can be found in
cyber-physical systems and Internet of things). Topics include (but
are not limited to):
· Forensics and threat investigations in IoT
· Forensics and threat investigations in peer-to-peer, and social networks
· Forensics and threat investigations in SDN/NFV
· Forensics and threat investigations in Cloud Computing
· Forensics and threat investigations in Smart Technologies Systems
(Smart Cars, Smart Homes, Smart Cities)
· Dark Web Investigations, Forensics, and Monitoring
· Forensics and threat investigations in Virtual private networks
· Security and Privacy in Clouds, Fog Computing, and 5G, and 6G
· Security and Privacy in IoT, SDN/NFV, and Edge Computing
· Security and Privacy in Smart Technologies Systems (Smart Cars,
Smart Homes, Smart Cities)
· Forensics and visualization of Big Data
· Trusted Computing in Smart Technologies Systems (Smart Cars, Smart
Homes, Smart Cities)
· Tools and services for cyber forensics and threat investigations
· OSINT (Open Source Intelligence)
· Cooperative and distributed forensics and threat investigations
· Advanced threat investigations, forensic and anti-forensic techniques
· Attack detection, traceback, and attribution in Emerging Technologies
· Malware Analysis and Attribution
· Digital Evidence Extraction/Analysis using Artificial intelligence,
Machine Learning, and Data Mining
· Data exfiltration techniques from networked devices and services
(e.g. cyber-physical systems, and Internet-of-Things)
· Methods for reconstruction of Digital Evidence in Emerging Technologies
· Forensics and threat investigations in E-health/M-health
· Vulnerability & threat detection and mitigation techniques for
networked services
· Novel large-scale investigations and Machine Learning techniques to
analyze intelligence data sets and logs
We also encourage contributions describing innovative work in the
realm of cybersecurity, cyber defense, and digital crimes.
********************
Submissions & Proceedings:
********************
Paper submissions must present original, research or experiences.
Late-breaking advances and work-in-progress reports from ongoing
research are also encouraged. Only original papers that have not been
published or submitted for publication elsewhere can be submitted.
Also, extended versions of conference or workshop papers that are
already published may be considered as long as the additional
contribution is at least 30% new content from the original. Each
submission must be written in English, accompanied by a 75 to 200 word
abstract and a list of up to 5 keywords. There is a length limitation
of 12 pages for full papers (including title, abstract, figures,
tables) plus 1 page for references.
Submissions must be in ECEASST-NetSys21 template: All accepted papers
will be included in the Workshop Proceedings to be published open
access by the European Association
of Software Science and Technology via the Electronic Communications
of the EASST (ECEASST) journal (
https://urldefense.proofpoint.com/v2/url?u=https-3A__journal.ub.tu-2Dberlin.de_index.php_eceasst&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=Sru4FNa1WHVjKlNgU4bnCfigrnbQI-aP6ML_XibgXMI&e= ) indexed in Scopus
and DBLP, and listed in the Directory of Open Access Journals (DOAJ).
In addition, the PC of NetSys'21 will select the best submitted
abstracts and ask their authors to submit extended versions to a
special issue of ACM TOIT ( https://urldefense.proofpoint.com/v2/url?u=https-3A__dl.acm.org_journal_toit&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=L1LW_J_igbCn5yRLN-fzjPiipqgfr3d2CriYhJrMNYU&e= ). More
details on https://urldefense.proofpoint.com/v2/url?u=https-3A__cfati3.conceptechint.net_submissions.html&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=XGzA802J4-bLfhGNsnOk5EQ-12iB0kXGb8QOyt_hpo8&e=
All accepted authors will be eligible to submit an extended version in
a fast track of:
International Journal of Cyber Forensics and Advanced Threat
Investigations (Open Access)
https://urldefense.proofpoint.com/v2/url?u=https-3A__conceptechint.net_index.php_CFATI&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=r1cVv9QTpkGz2qH0qwl_bhdN6KQfGXISzOAMw5rbQXk&e=
********************
Important dates:
********************
Paper Submission: May 30, 2021 (AOE)
Authors Notifications: July 8, 2021
Camera Ready due: July 22, 2021
Netsys 2021: September 13, 2021 – September 16, 2021
********************
Submission:
********************
Authors should submit their contributions electronically in PDF format
https://urldefense.proofpoint.com/v2/url?u=https-3A__easychair.org_conferences_-3Fconf-3Dcfati32021&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=VOSibphwULK5_nIuQL7TMZBA0v8xm2AG2Vsf0RHS6dA&e=
If you have any further questions please contact the workshop organizers via
https://urldefense.proofpoint.com/v2/url?u=https-3A__cfati3.conceptechint.net_contact-2Dus.html&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=DNp4yoJ8KTdaHYOqRKFefOywZOfHDz_Y3IG1JIEDhh0&e=
This workshop is technically supported by the Association of Cyber
Forensics and Threat Investigators (https://urldefense.proofpoint.com/v2/url?u=http-3A__www.acfti.org&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=2iifbSMJujtB7mDQ9di4n25q2v6crkxMPArxs9AhABU&e= ) and the Industrial
Cybersecurity Center (https://urldefense.proofpoint.com/v2/url?u=http-3A__www.cci-2Des.org&d=DwIFaQ&c=sJ6xIWYx-zLMB3EPkvcnVg&r=yQQsvTNAnbvDXGM4nDrXAje4pr0qHX2qIOcCQtJ5k3w&m=vhYQeCAMXwAhKJpWcCQ4Lx06PjEaqPcKYKmrS1N1HC4&s=g3P5rvwrLrVF7YIp7xsELvnxfRBI99iXsYBRArAEdC8&e= ).