Security
Headlines
HeadlinesLatestCVEs

Headline

2nd International Workshop On Cyber Forensics And Threat Investigations Challenges Call For Papers

The 2nd International Workshop on Cyber Forensics and Threat Investigations Challenges will take place October 10th through the 11th, 2022.

Packet Storm
#vulnerability#web#mac#git#intel#auth

2nd International Workshop On Cyber Forensics And Threat Investigations Challenges Call For Papers

2nd International Workshop on Cyber Forensics and ThreatInvestigations ChallengesOctober 10-11, 2022, Taking Place Virtually from the UKhttps://easychair.org/cfp/CFTIC2022Cyber forensics and threat investigations has rapidly emerged as a newfield of research to provide the key elements for maintainingsecurity, reliability, and trustworthiness of the next generation ofemerging technologies such as the internet of things, cyber-physicalsystems, cloud/edge/fog computing, software-defined network, andnetwork function virtualization. Complicated efforts are required insuitable and timely manners against any threats detected within thesesystems. Moreover, new frameworks are required to collect and preservepotential evidential data in suitable and timely manners as well. Toguarantee proper cyber-defenses and strategies against the expandinglandscape of criminal activities as well as rapidly advancing emergingtechnologies.The main motivation for this Workshop is to bring together researchersand practitioners working on cyber forensics and threat investigationsfor emerging infrastructures to disseminate current research issuesand advances. Original technical papers describing new,state-of-the-art research, will be considered. The Workshop welcomessubmissions that evaluate existing research results by reproducingexperiments. The aim of this workshop is to provide insight for thediscussion of the major research challenges and achievements onvarious topics of interest.Important DatesTechnical Paper Submission Deadline: 15 September 2022Poster and Demo Track Submission Deadline: 20 September 2022Authors Notifications: 30 September 2022Camera Ready due: 05 October 2022The registration is free-off-charge for All members of the Association(Thanks to our financial supporters who made this possible)Scope of The WorkshopTechnical Paper TrackPapers on practical as well as theoretical topics and problems invarious topics related to cyber forensics and threat investigationsare invited, with special emphasis on novel techniques and tools tocollect data from networked systems and services in emergingtechnologies (such as the ones can be found in cyber-physical systemsand Internet of things, cloud/edge/fog computing, software-definednetwork, and network function virtualization). Topics include (but arenot limited to):·        Forensics and threat investigations in IoT·        Forensics and threat investigations in peer-to-peer, andsocial networks·        Forensics and threat investigations in SDN/NFV·        Forensics and threat investigations in Cloud Computing·        Forensics and threat investigations in Smart TechnologiesSystems (Smart Cars, Smart Homes, Smart Cities)·        Dark Web Investigations, Forensics, and Monitoring·        Forensics and threat investigations in Virtual private networks·        Security and Privacy in Clouds, Fog Computing, and 5G, and 6G·        Security and Privacy in IoT, SDN/NFV, and Edge Computing·        Security and Privacy in Smart Technologies Systems (SmartCars, Smart Homes, Smart Cities)·        Forensics and visualization of Big Data·        Trusted Computing in Smart Technologies Systems (Smart Cars,Smart Homes, Smart Cities)·        Tools and services for cyber forensics and threat investigations·        OSINT (Open Source Intelligence)·        Cooperative and distributed forensics and threat investigations·        Advanced threat investigations, forensic and anti-forensic techniques·        Attack detection, traceback and attribution in Emerging Technologies·        Malware Analysis and Attribution·        Digital Evidence Extraction/Analysis using Artificialintelligence, Machine Learning and Data Mining·        Data exfiltration techniques from networked devices andservices (e.g. cyber-physical systems, and Internet-of-Things)·        Methods for reconstruction of Digital Evidence in Emerging Technologies·        Forensics and threat investigations in E-health/M-health·        Vulnerability & threat detection and mitigation techniquesfor networked services·        Novel large-scale investigations and Machine Learningtechniques to analyze intelligence data sets and logsWe also encourage contributions describing innovative work in therealm of cybersecurity, cyber defense, and digital crimes.Poster and Demo TrackCFTIC 2022 solicits the submission of posters and demos on specificaspects of cyber forensics and threat investigations, particularlyrelated to the subject areas indicated by the CFTIC 2022 topics ofinterest. Posters provide a forum for authors to present their work inan informal and interactive setting. They allow authors and interestedparticipants to engage in discussions about their work. In particular,a poster submission should motivate its relevance to the communitiesof cyber forensics and threat investigations, and summarize the mainchallenges, experiences, and novel ideas. A demonstration shouldpresent an existing tool or research prototype. Authors are expectedto provide a demonstration during the poster and demonstrationsession. A demonstration submission should clearly describe themotivation, the novelty of the contribution, and the applicability ofthe tool or prototype to specific use cases. Posters or demonstrationscan be submitted for evaluation in the form of an extended abstract.Submissions are limited to 1 page including references. Allsubmissions must present only original and unpublished work that isnot currently under review at any other venue. Demonstrations mustinclude in the abstract of the paper a link to a video of up to 5minutes hosted in a permanent location. The video must show theexisting tool or research prototype in action. Moreover,demonstrations are encouraged to include a link to a website where thesource code of the produced software is available when it is possible.SubmissionPaper submissions must present original research or experiences.Late-breaking advances and work-in-progress reports from ongoingresearch are also encouraged. Only original papers that have not beenpublished or submitted for publication elsewhere can be submitted.Also, extended versions of conference or workshop papers that arealready published may be considered as long as the additionalcontribution is at least 30% new content from the original. Eachsubmission must be written in English, accompanied by a 75 to 200-wordabstract, and a list of up to 5 keywords. There is a length limitationof 4 pages (at least 10pt font, one-column format) for extendedabstracts including (title, abstract, figures, tables, andreferences). Submissions must be in ECEASST-CFTIC 2022 template.Authors should submit their papers electronically via the EasyChaironline submission system. (https://easychair.org/conferences/?conf=cftic2022 )·        ECEASST-CFTIC-Latex-Template :https://conceptechint.net/ECEASST-cls-XXX-CFTIC-2022.zip·        ECEASST-CFTIC-Word-Template :https://conceptechint.net/ECEASST-%20CFTIC-2022.docThe submission processes will be managed by easychair If you have usedthis system before, you can use the same username and password. Ifthis is your first time using EasyChair, you will need to register foran account by clicking the “I have no EasyChair account” button. Uponcompletion of registration, you will get a notification email from thesystem and you are ready for submitting your paper. You can upload andre-upload the paper to the system.PublicationCFTIC 2022 proceedings are to be published open access via theElectronic Communications of the EASST Journal (ECEASST) indexed inScopus, DBLP, and listed in the Directory of Open Access Journals(DOAJ). Selected papers presented at the workshop, after furtherrevision, will have the opportunity to be published in special issuesin indexed and/or high-impact factor journals (details on thewebsite).Main Contact: If you have any further questions please contact theworkshop organizers via https://www.acfti.org/contactThis Workshop is Technically Supported byAssociation of Cyber Forensics and Threat Investigators (www.acfti.org)Industrial Cybersecurity Center (www.cci-es.org)Send by Andrew Zayin on Behalf of CFTIC2022 PC Chairs.Andrew Zayin Ph.D, CISSP, CISM, CRISC, CDPSE, PMP________________________________________________________Association of Cyber Forensics and Threat Investigatorshttps://www.acfti.orgTwitter: @acfti

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution