Monday, July 6, 2020

[DMANET] [CFP] 1st Workshop on Cyber Forensics & Advanced Threat Investigations in Emerging Networks

1st International Workshop on Cyber Forensics and Advanced Threat
Investigations in Emerging Networks (CFATI 2020)

CFATI 2020 will be held in conjunction with the 11th International
Conference on Emerging Ubiquitous Systems and Pervasive Networks
(EUSPN 2020) which is co-organized on November 2-5, 2020, Madeira,
Portugal.

Scope of the workshop:

The main motivation for this Workshop is to bring together researchers
and practitioners working on cyber forensics and threat investigations
for emerging networks to disseminate current research issues and
advances. Original technical papers describing new, state-of-the-art
research will be considered. The Workshop welcomes submissions that
evaluate existing research results by reproducing experiments. The aim
of this workshop is to provide insight for the discussion of the major
research challenges and achievements on various topics of interest.

Papers on practical as well as on theoretical topics and problems in
various topics related to cyber forensics and threat investigations
are invited, with special emphasis on novel techniques and tools to
collect data from networked devices and services in emerging networks
(such as the ones can be found in cyber-physical systems and Internet
of things). Topics include (but are not limited to):

· Advanced threat investigations, forensic and anti-forensic techniques
· Cooperative and distributed forensics and threat investigations
· Data exfiltration techniques from networked devices and services
(e.g. cyber-physical systems, and Internet-of-Things)
· Attack detection, traceback and attribution in SDN, 5G and 6G
· Methods for reconstruction of internet activities in SDN, 5G and 6G
· Forensics and threat investigations in IoT
· Forensics and threat investigations in peer-to-peer, social, and
cloud networks
· Vulnerability & threat detection and mitigation techniques for
networked services
· Novel large-scale investigations techniques to analyze intelligence
data sets and logs
· Tools and services for cyber forensics and threat investigations
· VoIP forensics, VoIPoW forensics

This Year Keynote: The Cat-and-Mouse Game with iOS Forensics
by Yuri Gubanov, CEO and founder of Belkasoft
The talk will focus on the role of checkm8 exploit and checkra1n
jailbreak in facilitating the acquisition of a full file system. More
details about the Keynote on
https://cfati.conceptechint.net/program.html

Workshop Proceedings

All papers accepted for the workshop will be published by the
prestigious Elsevier Procedia Computer Science, indexed by Scopus,
Engineering Village (Ei), and DBLP. The authors must follow Elsevier
guidelines as given on the workshop website. The number of pages for
the workshop paper is limited to 6 pages
https://cfati.conceptechint.net/submissions.html

Important dates

Paper Submission: 15th July, 2020 (Extended)
Acceptance Notification: 22nd Aug, 2020
Final Manuscript Due: 30th Aug, 2020

Submission

Authors should submit their contributions electronically in PDF format
https://easychair.org/conferences/?conf=cfati2020

Selective outstanding papers

Outstanding papers presented at the workshop will have the opportunity
to be invited to submit an extended version to special issues on:

Symmetry, Open Access Journal (IF: 2.143) by MDPI
Electronics, Open Access Journal (IF: 1.764) by MDPI
Applied Sciences, Open Access Journal (IF: 2.217) by MDPI
Mathematics, Open Access Journal (IF: 1.105) by MDPI
Sensors, Open Access Journal (IF: 3.031) by MDPI
CMC-Computers, Materials & Continua, Open Access Journal (IF: 3.024)
by Tech Science Press

All accepted authors will be eligible to submit an extended version in
a fast track of:
International Journal of Cyber Forensics and Advanced Threat
Investigations (Open Access)

For further details and updates please check the workshop website
https://cfati.conceptechint.net/index.html

**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************