ISDFS conference is the leading event that brings together industry professionals, academics, and engineers to exchange knowledge and ideas in the fields of digital forensics, cybersecurity, big data privacy and security, artificial intelligence in security and forensics, software engineering, signal processing, and computer science at large.
Hosted by Wentworth Institute of Technology in Massachusetts, U.S., the conference will also be accessible online. The program will feature special sessions, workshops, tutorials, keynote presentations, panel discussions, posters, and oral presentations.
All submissions will be reviewed by at least two members of the Scientific Program Committee. Accepted and registered papers will be submitted for inclusion in IEEE Xplore, provided they meet the scope and quality standards required by IEEE Xplore. Papers must be written in English and formatted according to IEEE guidelines. Submissions that do not adhere to the specified format will be rejected, regardless of content quality.
The conference will cover a wide range of topics, including but not limited to, the following areas:
Digital Forensics
– Digital Forensics Process Model
– Information Systems and Crime Analysis
– Business Applications of Digital Forensics
– Digital Forensics Techniques and Tools
– Legal and Policy Issues in Digital Forensics
– Digital Forensics Case Studies
– Database Forensics
– Cloud Forensics
– Mobile & Multimedia Forensics
– Network Forensics
– Digital Forensics Training and Education
– Big Data and Digital Forensics
– Cyber Forensics
– Digital Forensics Tool Testing and Validation
– Trends in Digital Forensics
– Digital Forensics and Law
– Anti and Counter Forensics
– Data Hiding and Recovery
– Cyber Crime Investigations
– Cyber Culture & Cyber Terrorism
– Incident Response
– Information Warfare & Critical Infrastructure Protection
Cybersecurity
– Steganography and Steganalysis
– Secure Multiparty Computation
– Biometric Approaches
– Computer Security
– Mobile Communications Security
– Operating System Security
– Trusted Computing
– Network Security
– Wireless Security
– Database Security
– IPTV Security
– E-commerce Protocols
– Content Filtering and Tracing
– Distributed System Security
– Security Weaknesses in Information Technologies
– Secure Code Development
– Penetration Testing
– Intrusion Detection Systems
– Malicious Codes and Spyware
– Viruses, Spyware, Spamware, and Scams
– Energy/Cost/Efficiency of Cloud Security
– Security Risk Models and Clouds
– Security Standards and Practices
Data Privacy
– Digital Signatures
– Certified Electronic Mail
– Certificates and Certificate Management
– Standards and Protocols
– Trust Models
– Key and Identity Management
– Digital Signature Policies and Law
– Validity of Digital Signatures in Government, Finance, and Commerce
– Effects of Digital Signature on Law
– Legal Responsibilities Related to Digital Signatures
– Discrepancies in Digital Signatures
– Judicial Rulings on Digital Signatures
– Digital Signature Laws in Other Countries
Cryptography
– Block Ciphers and Stream Ciphers
– Public Key Cryptography
– Quantum Cryptography
– Elliptic Curve Cryptography
– Algebraic Curves in Cryptography
– Homomorphic Encryption
– Cryptographic Protocols
– Zero-Knowledge Proofs
– Secret Sharing
– Cryptanalysis
– Hash Functions
– Applications of Coding Theory in Cryptography
– Smart Card Applications and Security
– Cryptographic Hardware and Embedded Systems
– Specialized Hardware for Cryptographic Attacks
– Side-Channel Analysis and Countermeasures
– Pairing-Based Cryptography
– Key and Identity Management
Artificial Intelligence (AI) / Machine Learning (ML)
– Artificial Intelligence and Deep Learning
– Machine Learning
– Data Science
– AI and ML in Information Systems and Cybersecurity
– AI and ML in Privacy
– AI and ML in Cybersecurity Applications
– AI and ML in Steganography
– AI and ML in Cryptography
– AI and ML in 4G, LTE, and 5G Networks
– AI and ML in Operating System Security
– AI and ML in Database Security
Big Data
– Big Data Security
– Big Data Forensics
– Robust Deep Learning
– Secure Deep Learning/Machine Learning
– Multi-Party Computing
– Edge/Fog Computing
– Energy Consumption
– High-Performance Computing
– Heterogeneous Resources
– Cloud Models and Architectures
– Telehealth Applications
– Resource Allocation and Load Balancing
– Multimedia and Quality of Service (QoS)
Computer Science
– Artificial Intelligence and Deep Learning
– Cloud Computing
– Data Mining/Big Data
– High-Performance Computing
– Internet of Things (IoT)
– Virtual and Augmented Reality
– Secure Systems
– Signal/Image/Video Processing
– Human-Machine Interaction
– Bioinformatics
– Robotics
– Social Networks
– Algorithms and Data Structures
– Game Theory
– Soft Computing
– Natural Language Processing
– Operating Systems
– Computer Graphics
– Programming Languages
– Software Engineering
– Theory of Computation