May 01, 2024

Dear ISDFS Participants

With your support, we have completed the ISDFS event in 2024. Some of you came from far away, attended the symposium in person, and were among us.

As you have witnessed, Dr. Eva Tuba and her team organized a wonderful event. We thank Eva and her team with heartfelt feelings. We would also like to thank the Trinity University administration for allowing this event to be held.

The foreword we prepared for this event is in the abstract book. After this stage, we will ensure your papers are published in the IEEE Xplore Digital Library. You can find all kinds of announcements on our ISDFS website.

We will soon announce to you the country and university where we want to hold the ISDFS event in 2025. We hope to see you, valuable academicians, who have previously participated in our ISDFS event, among us again at our event next year. On this occasion, we wish you all health and happiness. 

ATTENTION!

In line with the opinions of the symposium consortium members, the deadline for submitting papers to the symposium has been extended for the last time until

March 20, 2024.

ISDFS is the premier event that brings together industry professionals, academics, and engineers to exchange information and ideas on digital forensics, cybersecurity, big data privacy and security, artificial intelligence in security and forensics, software engineering, signal processing, and computer science in general.

The symposium will be held by Trinity University, TX, US, and will be available ONLINE as well. The symposium program will include special sessions, workshops, tutorials, keynotes, panel discussions, posters, and oral presentations.

Submissions will be evaluated by at least 2 Scientific Program Committee members. Accepted and registered papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements. Papers should be prepared in English using the IEEE format. Papers that do not conform to the format will not be accepted despite content compliance.

Topics within the scope of the symposium include, but are not limited to, the following areas:

Digital Forensics
Cyber Security
Data Privacy
Cryptography
Artificial Intelligence (AI) / Machine Learning (ML)
Big Data
Computer Science

Digital Forensics

Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection.

Cybersecurity

Steganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices.

Data Privacy

Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries.

Cryptography

Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero-Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography, Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side-Channel Analysis, and Countermeasures, Pairing Based Cryptography, Key and Identity Management.

Artificial Intelligence (AI) / Machine Learning (ML)

Artificial Intelligence, Artificial/Deep Learning, Machine Learning, Data Science, AI and ML in Information Systems and Cybersecurity, AI and ML in Privacy, AI and ML in Cybersecurity Applications, AI and ML in Steganography, AI and ML in Cryptography, AI and ML in 4G, LTE, and 5G networks, AI and ML in Operating System Security, AI and ML in Database Security.

Big Data

Big Data Security, Big Data Forensics, robust deep learning, secure deep learning/machine learning, multi-party computing, edge/fog computing, energy consumptions, high performance, heterogeneous resources, cloud models, heterogeneous architecture, telehealth, resource allocation, load balance, multimedia, and QoS.

Computer Science

Artificial Intelligence, Artificial/Deep Learning, Cloud Computing, Data Mining/Big Data, High-Performance Computing, Internet of Things, Virtual and Augmented Reality, Secure Systems, Signal/Image/Video Processing, Human-Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer  Graphics, Programming Languages, Software Engineering, Theory of Computation.

At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2023 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented.