posted by user: Concet || 1618 views || tracked by 3 users: [display]

CFATI3 2021 : 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies


When Sep 13, 2021 - Sep 16, 2021
Where Lübeck, Germany
Submission Deadline May 30, 2021
Notification Due Jul 8, 2021
Final Version Due Jul 22, 2021
Categories    cybersecurity   digital forensics   incident response   threat investigations

Call For Papers

1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Technologies (CFATI3 2021)

Cyber forensics and threat investigations has rapidly emerged as a new field of research to provide the key elements for maintaining security, reliability, and trustworthy of the next generation of emerging technologies such as the internet of things, cyber-physical systems, cloud/edge/fog computing, software-defined network, and network function virtualization. Complicated efforts are required in suitable and timely manners against any threats detected within these systems. Moreover, new frameworks are required to collect and preserve potential evidential data in suitable and timely manners as well. To guarantee proper cyber-defenses and strategies against the expanding landscape of criminal activities as well as rapidly advancing emerging technologies..

The major motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging technologies to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research, will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest.

CFATI3 2021 is a virtual workshop​ that will be held on the 13 of September 2021.

Important Dates: May 30, 2021

​Papers Submission Due: July 8, 2021

Final Manuscript Due: July 22, 2021

WebSite :

This Year Keynote:

Scope of The Workshop: ​
Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked systems and services in emerging technologies (such as the ones can be found in cyber-physical systems and Internet of things, cloud/edge/fog computing, software-defined network, and network function virtualization). Topics include (but are not limited to):

- Forensics and threat investigations in IoT
- Forensics and threat investigations in peer-to-peer, and social networks
- Forensics and threat investigations in SDN/NFV
- Forensics and threat investigations in Cloud Computing
- Forensics and threat investigations in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Dark Web Investigations, Forensics, and Monitoring
- Forensics and threat investigations in Virtual private networks
- Security and Privacy in Clouds, Fog Computing, and 5G, and 6G
- Security and Privacy in IoT, SDN/NFV, and Edge Computing
- Security and Privacy in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Forensics and visualization of Big Data
- Trusted Computing in Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities)
- Tools and services for cyber forensics and threat investigations
OSINT (Open Source Intelligence)
- Cooperative and distributed forensics and threat investigations
- Advanced threat investigations, forensic and anti-forensic techniques
- Attack detection, traceback and attribution in Emerging Technologies
- Malware Analysis and Attribution
- Digital Evidence Extraction/Analysis using Artificial intelligence, Machine Learning and Data Mining
- Data exfiltration techniques from networked devices and services (e.g. cyber-physical systems, and Internet-of-Things)
- Methods for reconstruction of Digital Evidence in Emerging Technologies
- Forensics and threat investigations in E-health/M-health
- Vulnerability & threat detection and mitigation techniques for networked services
- Novel large-scale investigations and Machine Learning techniques to analyze intelligence data sets and logs

We also encourage contributions describing innovative work in the realm of cybersecurity, cyber defense, and digital crimes.


Paper submissions must present original, research or experiences. Late-breaking advances and work-in-progress reports from ongoing research are also encouraged. Only original papers that have not been published or submitted for publication elsewhere can be submitted. Also extended versions of conference or workshop papers that are already published may be considered as long as the additional contribution is at least 30% new content from the original. Each submission must be written in English, accompanied by a 75 to 200 word abstract and a list of up to 5 keywords. There is a length limitation of 6 A4 (210 mm x 297 mm) pages for full papers (including title, abstract, figures, tables) plus 1 page for references. Submissions must be in 2-column IEEE conference style with a minimum font size of 10 pt. Papers exceeding these limits, multiple submissions, and self-plagiarized papers will be rejected without further review. Authors should submit their papers electronically via the EasyChair online submission system under the following link: .

The submission processes will be managed by If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking “I have no EasyChair account” button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system.


Selected papers presented at the workshop, after further revision, will have the opportunity to be published in special issues in indexed and/or high impact factor journals (details on the website).

Organizing Committee
Workshop Program Chair

John William Walker, Nottingham Trent University, United Kingdom.

Ahmed Elmesiry, University of South Wales, United Kingdom

Workshop Coordinator

Mamoun Qasem, University of South Wales, United Kingdom

Technical Program Committee

Yucel Saygin, Sabancı University, Turkey

Ali Jwaid, De Montfort University, United Kingdom

Karima Boudaoud, University of Nice Sophia Antipolis, France

Dmitri Botvich, Waterford Institute of Technology, Ireland

Mohammed Saad, Nottingham Trent University, United Kingdom​

Mohamed Aborizka, Arab Academy for Science, Technology, Egypt.

Main Contact:
If you have any further questions please contact the workshop organizers via

Related Resources

FSI: DI Journal - 2023   Special Issue on 'Deepfake Media in Case Investigations: Practical Implications, Interventions and Solutions'
IoTE 2023   4th International Conference on Internet of Things & Embedded Systems
CPS4CIP 2023   The 4th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection
Electronics SI 2022   Electronics: Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
ADCO 2023   10th International Conference on Advanced Computing
ICCWS 2024   19th International Conference on Cyber Warfare and Security
BCYIoT 2023   International Conference on Blockchain, Cybersecurity and Internet of Things
HICSS AI4Cyber and Cyber4AI 2024   HICSS 57 Mini-Track: Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI
ENS 2023   6th International Workshop on Emerging Network Security
CYBER 2023   The Eighth International Conference on Cyber-Technologies and Cyber-Systems