[prev in list] [next in list] [prev in thread] [next in thread] 

List:       sleuthkit-users
Subject:    [sleuthkit-users] [CFP] 2nd International Workshop on Cyber Forensics and Threat Investigations Chal
From:       Andrew Zayine <scholarshipchile () gmail ! com>
Date:       2022-07-16 19:08:55
Message-ID: CACsGmeQejsahD8KZyEWFyOY875k2rxvsobDM7oQ36Fg+AJNEEA () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


*2nd International Workshop on Cyber Forensics and Threat Investigations
Challenges*

                     *October 10-11, 2022, Taking Place Virtually from the
UK*

https://easychair.org/cfp/CFTIC2022


Cyber forensics and threat investigations has rapidly emerged as a new
field of research to provide the key elements for maintaining security,
reliability, and trustworthiness of the next generation of emerging
technologies such as the internet of things, cyber-physical systems,
cloud/edge/fog computing, software-defined network, and network function
virtualization. Complicated efforts are required in suitable and timely
manners against any threats detected within these systems. Moreover, new
frameworks are required to collect and preserve potential evidential data
in suitable and timely manners as well. To guarantee proper cyber-defenses
and strategies against the expanding landscape of criminal activities as
well as rapidly advancing emerging technologies.

The main motivation for this Workshop is to bring together researchers and
practitioners working on cyber forensics and threat investigations for
emerging infrastructures to disseminate current research issues and
advances. Original technical papers describing new, state-of-the-art
research, will be considered. The Workshop welcomes submissions that
evaluate existing research results by reproducing experiments. The aim of
this workshop is to provide insight for the discussion of the major
research challenges and achievements on various topics of interest.

*Important Dates*

*Technical Paper Submission Deadline: **15 September 2022*

*Poster and Demo Track Submission Deadline: **20 September 2022*

*Authors Notifications: **30 September 2022*

*Camera Ready due: **05 October 2022*

*The registration is **free-off-charge **for All members of the Association
**(Thanks to our financial supporters who made this possible)*

Scope of The Workshop

*Technical Paper Track*

Papers on practical as well as theoretical topics and problems in various
topics related to cyber forensics and threat investigations are invited,
with special emphasis on novel techniques and tools to collect data from
networked systems and services in emerging technologies (such as the ones
can be found in cyber-physical systems and Internet of things,
cloud/edge/fog computing, software-defined network, and network function
virtualization). Topics include (but are not limited to):

 ·        Forensics and threat investigations in IoT

 ·        Forensics and threat investigations in peer-to-peer, and social
networks

 ·        Forensics and threat investigations in SDN/NFV

 ·        Forensics and threat investigations in Cloud Computing

 ·        Forensics and threat investigations in Smart Technologies Systems
(Smart Cars, Smart Homes, Smart Cities)

 ·        Dark Web Investigations, Forensics, and Monitoring

 ·        Forensics and threat investigations in Virtual private networks

 ·        Security and Privacy in Clouds, Fog Computing, and 5G, and 6G

 ·        Security and Privacy in IoT, SDN/NFV, and Edge Computing

 ·        Security and Privacy in Smart Technologies Systems (Smart Cars,
Smart Homes, Smart Cities)

 ·        Forensics and visualization of Big Data

 ·        Trusted Computing in Smart Technologies Systems (Smart Cars, Smart
Homes, Smart Cities)

 ·        Tools and services for cyber forensics and threat investigations

 ·        OSINT (Open Source Intelligence)

 ·        Cooperative and distributed forensics and threat investigations

 ·        Advanced threat investigations, forensic and anti-forensic
techniques

 ·        Attack detection, traceback and attribution in Emerging
Technologies

 ·        Malware Analysis and Attribution

 ·        Digital Evidence Extraction/Analysis using Artificial
intelligence, Machine Learning and Data Mining

 ·        Data exfiltration techniques from networked devices and services
(e.g. cyber-physical systems, and Internet-of-Things)

 ·        Methods for reconstruction of Digital Evidence in Emerging
Technologies

 ·        Forensics and threat investigations in E-health/M-health

 ·        Vulnerability & threat detection and mitigation techniques for
networked services

 ·        Novel large-scale investigations and Machine Learning techniques
to analyze intelligence data sets and logs

We also encourage contributions describing innovative work in the realm of
cybersecurity, cyber defense, and digital crimes.

*Poster and Demo Track*

CFTIC 2022 solicits the submission of posters and demos on specific aspects
of cyber forensics and threat investigations, particularly related to the
subject areas indicated by the CFTIC 2022 topics of interest. Posters
provide a forum for authors to present their work in an informal and
interactive setting. They allow authors and interested participants to
engage in discussions about their work. In particular, a poster submission
should motivate its relevance to the communities of cyber forensics and
threat investigations, and summarize the main challenges, experiences, and
novel ideas. A demonstration should present an existing tool or research
prototype. Authors are expected to provide a demonstration during the
poster and demonstration session. A demonstration submission should clearly
describe the motivation, the novelty of the contribution, and the
applicability of the tool or prototype to specific use cases. Posters or
demonstrations can be submitted for evaluation in the form of an extended
abstract. Submissions are limited to 1 page including references. All
submissions must present only original and unpublished work that is not
currently under review at any other venue. Demonstrations must include in
the abstract of the paper a link to a video of up to 5 minutes hosted in a
permanent location. The video must show the existing tool or research
prototype in action. Moreover, demonstrations are encouraged to include a
link to a website where the source code of the produced software is
available when it is possible.

Submission

Paper submissions must present original research or experiences.
Late-breaking advances and work-in-progress reports from ongoing research
are also encouraged. Only original papers that have not been published or
submitted for publication elsewhere can be submitted. Also, extended
versions of conference or workshop papers that are already published may be
considered as long as the additional contribution is at least 30% new
content from the original. Each submission must be written in English,
accompanied by a 75 to 200-word abstract, and a list of up to 5 keywords.
There is a length limitation of 4 pages (at least 10pt font, one-column
format) for extended abstracts including (title, abstract, figures, tables,
and references). Submissions must be in ECEASST-CFTIC 2022 template.
Authors should submit their papers electronically via the EasyChair online
submission system <https://easychair.org/conferences/?conf=cftic2022>.

 ·        ECEASST-CFTIC-Latex-Template
<https://conceptechint.net/ECEASST-cls-XXX-CFTIC-2022.zip>

 ·        ECEASST-CFTIC-Word-Template
<https://conceptechint.net/ECEASST-%20CFTIC-2022.doc>

The submission processes will be managed by easychair
<https://easychair.org/conferences/?conf=cftic2022> If you have used this
system before, you can use the same username and password. If this is your
first time using EasyChair, you will need to register for an account by
clicking the "I have no EasyChair account" button. Upon completion of
registration, you will get a notification email from the system and you are
ready for submitting your paper. You can upload and re-upload the paper to
the system.

Publication

CFTIC 2022 proceedings are to be published open access via the Electronic
Communications of the EASST Journal (ECEASST) indexed in *Scopus*, *DBLP,* and
listed in the *Directory of Open Access Journals (DOAJ)*. Selected papers
presented at the workshop, after further revision, will have the
opportunity to be published in special issues in indexed and/or high-impact
factor journals (details on the website).

Main Contact

If you have any further questions please contact the workshop organizers
via https://www.acfti.org/contact

This Workshop is Technically Supported by

Association of Cyber Forensics and Threat Investigators (www.acfti.org)

Industrial Cybersecurity Center (www.cci-es.org)

Send by Andrew Zayin on Behalf of CFTIC2022 PC Chairs.

Andrew Zayin Ph.D, CISSP, CISM, CRISC, CDPSE, PMP
________________________________________________________
Association of Cyber Forensics and Threat Investigators
https://www.acfti.org
Twitter: @acfti

[Attachment #5 (text/html)]

<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div \
dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div \
dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div \
dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div \
dir="ltr"><div class="gmail_quote"><div dir="ltr"><p class="MsoNormal" \
style="text-align:center;margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b \
style="font-size:12pt"><span \
style="font-size:16pt;font-family:Cambria,serif;color:rgb(0,111,192)">2<sup>nd</sup> \
International Workshop on Cyber Forensics and Threat Investigations \
Challenges</span></b><br></p><p class="MsoNormal" align="center" \
style="text-align:center;margin:0cm 0cm \
0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-family:&quot;Times New Roman&quot;,serif"></span></p><p \
style="text-align:center;margin:0cm 0cm \
0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:16pt;font-family:Cambria,serif;color:rgb(0,111,192)"><b>             \
</b></span><span style="font-size:12pt;text-align:center"><b>October 10-11, 2022, \
Taking Place Virtually from the UK</b></span></p><p \
style="text-align:center;margin:0cm 0cm \
0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><a \
href="https://easychair.org/cfp/CFTIC2022" \
target="_blank">https://easychair.org/cfp/CFTIC2022</a><span \
style="font-size:12pt;text-align:center"><b><br></b></span></p><p \
style="text-align:center;margin:0cm 0cm \
0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:12pt;text-align:center"><br></span></p><p class="MsoNormal" \
style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Cyber forensics and \
threat investigations has rapidly emerged as a new field of research to provide the
key elements for maintaining security, reliability, and trustworthiness of the
next generation of emerging technologies such as the internet of things,
cyber-physical systems, cloud/edge/fog computing, software-defined network, and
network function virtualization. Complicated efforts are required in suitable
and timely manners against any threats detected within these systems. Moreover,
new frameworks are required to collect and preserve potential evidential data
in suitable and timely manners as well. To guarantee proper cyber-defenses and
strategies against the expanding landscape of criminal activities as well as
rapidly advancing emerging technologies.  </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The main motivation \
for this Workshop is to bring together researchers and practitioners working on
cyber forensics and threat investigations for emerging infrastructures to
disseminate current research issues and advances. Original technical papers \
describing new, state-of-the-art research, will be considered. The Workshop welcomes
submissions that evaluate existing research results by reproducing experiments.
The aim of this workshop is to provide insight for the discussion of the major
research challenges and achievements on various topics of interest.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(41,128,185)">Important \
Dates</span></u></b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(41,128,185)">     \
</span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">       \
<b>  </b></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Technical Paper \
                Submission
Deadline:  </span></b><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">15 \
September 2022</span></b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Poster and Demo \
Track Submission Deadline:  </span></b><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">20 \
September 2022</span></b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span \
                style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Authors
                
Notifications:  </span></b><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">30 \
September 2022</span></b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Camera Ready due:  \
</span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">05
 October 2022</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The registration is \
</span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:red">free-off-charge
 </span></b><b><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">for All members of \
the Association </span></b><b style="font-size:12pt"><span \
style="font-size:8pt;font-family:Verdana,sans-serif;color:black">(Thanks to our \
financial supporters who made this possible)</span></b></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt \
20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Scope of The \
Workshop</span></p>

</div>

<div style="border-top:none;border-right:none;border-bottom:none;border-left:6pt \
solid rgb(0,107,173);padding:0cm 0cm 0cm \
20pt;background:rgb(202,217,226);margin-left:20pt;margin-right:0cm">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span \
style="font-size:16.5pt;font-family:Arial,sans-serif;color:rgb(0,95,152)">Technical \
Paper Track</span></u></b><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:rgb(0,95,152)"></span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Papers on practical \
as well as theoretical topics and problems in various topics related to cyber \
forensics and threat investigations are invited, with special emphasis on novel
techniques and tools to collect data from networked systems and services in
emerging technologies (such as the ones can be found in cyber-physical systems
and Internet of things, cloud/edge/fog computing, software-defined network, and
network function virtualization). Topics include (but are not limited to):</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in IoT</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in peer-to-peer, and social networks</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in SDN/NFV</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in Cloud Computing</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in Smart Technologies Systems (Smart Cars, Smart Homes, Smart
Cities)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Dark Web \
Investigations, Forensics, and Monitoring</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in Virtual private networks</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and \
Privacy in Clouds, Fog Computing, and 5G, and 6G</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and \
Privacy in IoT, SDN/NFV, and Edge Computing</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and \
Privacy in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)  \
</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
visualization of Big Data</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Trusted Computing \
in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Tools and services \
for cyber forensics and threat investigations</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">OSINT (Open Source \
Intelligence)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Cooperative and \
distributed forensics and threat investigations</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Advanced threat \
investigations, forensic and anti-forensic techniques</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Attack detection, \
traceback and attribution in Emerging Technologies</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Malware Analysis \
and Attribution</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Digital Evidence \
Extraction/Analysis using Artificial intelligence, Machine Learning and Data \
Mining</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Data exfiltration \
techniques from networked devices and services (e.g. cyber-physical systems, and \
Internet-of-Things)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Methods for \
reconstruction of Digital Evidence in Emerging Technologies</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and \
threat investigations in E-health/M-health</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Vulnerability &amp; \
threat detection and mitigation techniques for networked services</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
21.3pt;background-image:initial;background-position:initial;background-size:initial;ba \
ckground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Novel large-scale \
investigations and Machine Learning techniques to analyze intelligence data sets and \
logs</span></p><p class="MsoNormal" style="margin:0cm 0cm \
9pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">We also encourage \
contributions describing innovative work in the realm of cybersecurity, cyber \
defense, and digital crimes.</span></p>

<div style="border-top:none;border-right:none;border-bottom:none;border-left:6pt \
solid rgb(0,107,173);padding:0cm 0cm 0cm \
20pt;background:rgb(202,217,226);margin-left:20pt;margin-right:0cm">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span \
style="font-size:16.5pt;font-family:Arial,sans-serif;color:rgb(0,95,152)">Poster and \
Demo Track</span></u></b><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:rgb(0,95,152)"></span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">CFTIC 2022 solicits \
the submission of posters and demos on specific aspects of cyber forensics and
threat investigations, particularly related to the subject areas indicated by
the CFTIC 2022 topics of interest. Posters provide a forum for authors to
present their work in an informal and interactive setting. They allow authors
and interested participants to engage in discussions about their work. In
particular, a poster submission should motivate its relevance to the
communities of cyber forensics and threat investigations, and summarize the
main challenges, experiences, and novel ideas. A demonstration should present
an existing tool or research prototype. Authors are expected to provide a
demonstration during the poster and demonstration session. A demonstration
submission should clearly describe the motivation, the novelty of the
contribution, and the applicability of the tool or prototype to specific use
cases. Posters or demonstrations can be submitted for evaluation in the form of
an extended abstract. Submissions are limited to 1 page including references.
All submissions must present only original and unpublished work that is not
currently under review at any other venue. Demonstrations must include in the
abstract of the paper a link to a video of up to 5 minutes hosted in a
permanent location. The video must show the existing tool or research prototype
in action. Moreover, demonstrations are encouraged to include a link to a
website where the source code of the produced software is available when it is
possible.</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt \
20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Submission</span></p>


</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Paper submissions \
must present original research or experiences. Late-breaking advances and
work-in-progress reports from ongoing research are also encouraged. Only
original papers that have not been published or submitted for publication
elsewhere can be submitted. Also, extended versions of conference or workshop
papers that are already published may be considered as long as the additional
contribution is at least 30% new content from the original. Each submission
must be written in English, accompanied by a 75 to 200-word abstract, and a
list of up to 5 keywords. There is a length limitation of 4 pages (at least
10pt font, one-column format) for extended abstracts including (title,
abstract, figures, tables, and references). Submissions must be in ECEASST-CFTIC
2022 template. Authors should submit their papers electronically via the </span><a \
href="https://easychair.org/conferences/?conf=cftic2022" style="color:blue" \
target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">EasyChair \
online submission system</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
1cm;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><a \
href="https://conceptechint.net/ECEASST-cls-XXX-CFTIC-2022.zip" style="color:blue" \
target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">ECEASST-CFTIC-Latex-Template</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt \
1cm;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:10pt;font-family:Symbol;color:black"> ·<span \
style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:&quot;Times \
New Roman&quot;">               </span></span><span dir="LTR"></span><a \
href="https://conceptechint.net/ECEASST-%20CFTIC-2022.doc" style="color:blue" \
target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">ECEASST-CFTIC-Word-Template</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The submission \
processes will be managed by  </span><a \
href="https://easychair.org/conferences/?conf=cftic2022" style="color:blue" \
target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">easychair</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"> If you have used \
this system before, you can use the same username and password. If this is your first \
time using EasyChair, you will need to register for an account by clicking the "I \
have no EasyChair account" button. Upon completion of registration, you will get a \
notification email from the system and you are ready for submitting your paper. You \
can upload and re-upload the paper to the system.</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt \
20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Publication</span></p>


</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;text-align:justify;background-image:initial;background-position:initial;backgroun \
d-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">CFTIC 2022 \
proceedings are to be published open access via the Electronic Communications of the \
EASST Journal (ECEASST) indexed in  <b>Scopus</b>,  <b>DBLP,</b>  and
listed in the  <b>Directory of Open Access Journals (DOAJ)</b>. Selected
papers presented at the workshop, after further revision, will have the
opportunity to be published in special issues in indexed and/or high-impact
factor journals (details on the website).</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt \
20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="color:white;font-family:Verdana,sans-serif;font-size:16pt">Main \
Contact</span><br></p></div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">If you have any \
further questions please contact the workshop organizers via  </span><a \
href="https://www.acfti.org/contact" style="color:blue" target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">https://www.acfti.org/contact</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt \
20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm \
6pt;background-image:initial;background-position:initial;background-size:initial;backg \
round-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:16pt;font-family:Verdana,sans-serif;color:white">This Workshop is \
Technically Supported by</span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Association of \
Cyber Forensics and Threat Investigators (</span><a href="https://www.acfti.org/" \
style="color:blue" target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">www.acfti.org</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt \
10pt;background-image:initial;background-position:initial;background-size:initial;back \
ground-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Industrial \
Cybersecurity Center (</span><a href="https://www.cci-es.org/" style="color:blue" \
target="_blank"><span \
style="font-size:11pt;font-family:Verdana,sans-serif">www.cci-es.org</span></a><span \
style="font-size:11pt;font-family:Verdana,sans-serif;color:black">)</span></p><div><span \
style="font-family:verdana,sans-serif"><br></span></div><div><span \
style="font-family:verdana,sans-serif">Send by  </span><span \
style="font-family:verdana,sans-serif">Andrew Zayin  </span><span \
style="font-family:verdana,sans-serif">on Behalf of CFTIC2022 PC \
Chairs.</span><br></div><div><span \
style="font-family:verdana,sans-serif"><br></span></div><div><span \
style="font-family:verdana,sans-serif">Andrew Zayin Ph.D, CISSP, CISM, CRISC, CDPSE, \
PMP</span><br></div><div><font face="verdana, \
sans-serif">________________________________________________________<br>Association \
of Cyber Forensics and Threat Investigators<br><a href="https://www.acfti.org/" \
rel="noreferrer" target="_blank">https://www.acfti.org</a><br>Twitter: \
@acfti</font></div></div> </div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>





_______________________________________________
sleuthkit-users mailing list
https://lists.sourceforge.net/lists/listinfo/sleuthkit-users
http://www.sleuthkit.org


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic