Call for Papers: 17th EAI International Conference on Digital Forensics & Cyber Crime in Reykjavik, Iceland, 8 - 10 September, 2026

Helmut Neukirchen, 17. November 2025

The 17th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2026) will take place in Reykjavik, Iceland, 8 - 10 September, 2026. Proceedings published by Springer.

While the submission system is not yet open (we are still setting it up, incl. a way to propose a tutorial workshop), be aware of the submission deadline: 20th January, 2026


CALL FOR PAPERS

EAI ICDF2C 2026: 17th EAI International Conference on Digital Forensics & Cyber Crime

https://icdf2c.eai-conferences.org/2026/

When: 8 - 10 September, 2026

Where: Reykjavík, Iceland

Submission deadline: 20th January, 2026

Notification deadline: 25th April, 2026

Camera-ready deadline: 15th May, 2026

Scope

The 17th EAI International Conference on Digital Forensics & Cyber
Crime (ICDF2C) will be held on 8-10 September, 2026, in Reykjavik
(Iceland). This three-day event is expected to attract well over 100
participants, including academics, practitioners, criminologists (or
law enforcement) and vendors, providing business and intellectual
engagement opportunities among attendees. The conference is organized
by the European Alliance for Innovation (EAI).

This conference's theme is cyber analytics and forensics in the era of
emerging threats. Novel cyber threats are continuously emerging,
catalysed by the rapid deployment of Large Language ModelI and other
AI across many domains which increases the threat surface in many
sectors such as Smart Industry, Fintech and digital government. The
focus of this conference is to provide a platform for discussing these
emerging threats and to identify priorities for the community to
target with the next generation of cyber analytics. We particularly
welcome research which studies the dynamics between human factors and
AI technologies and the corresponding impact upon cybersecurity and
forensics.

Potential tutorial workshops may include password cracking for
forensics, forensic education, forensic applications of AI, responding
to an incident from a police or corporate interaction perspective,
including what to expect when you involve law enforcement.

***

Publication

All registered papers will be submitted for publishing by Springer –
LNICST series and made available through SpringerLink Digital Library:
ICDF2C proceedings.

Proceedings will be submitted for inclusion in leading indexing
services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital
Library, IO-Port, MatchSciNet, Inspec and Zentralblatt MATH.

All accepted authors are eligible to submit an extended version in a fast track of:
- EAI Endorsed Transactions on Security and Safety
- EAI Endorsed Transactions on Internet of Things

***

Topics

Theme: Cyber analytics and forensics in the era of emerging threats.

Applications of artificial intelligence (AI) and other related technologies:
- Anti-forensics and anti-anti-forensics (e.g., deepfake)
- Deep learning
- Explainable AI (XAI)
- Generative AI (GenAI)
- Large language model (LLM)

Device forensics:
- Blockchain investigations
- Internet of Things (IoT) forensics 
 (including industrial IoT, medical IoT, military IoT, battlefield IoT, and vehicular IoT)
- Edge and/or cloud forensics
- Network and distributed system forensics
- Virtual / augmented reality (VR/AR) forensics
- Other emerging / contemporary technologies 
 (e.g., hardware and software such as firmware and operating systems)

Financial crime investigations:
- Financial frauds and scams
- Cryptocurrency investigations
- Market manipulation investigations
- Anti-money laundering / counter terrorism financing investigations
- Anti-corruption investigations

Cyber security and analytics:
- Network security (e.g., intrusion detection)
- Malware analysis
- IoT security
- Security operations center
- Virtual / augmented reality (VR/AR)

Education and Evaluation:
- Case studies – legal (e.g., child sexual abuse material) and/or technical
- Infrastructure
- Methodology
- Replicability and validity
- Tool validation

Theory and fundamentals:
- Anti-forensics and anti-anti-forensics (e.g., encryption and deepfake)
- Frameworks (legal, policy, and/or technical)
- Privacy-preserving forensics
- Social and privacy
- Steganography and steganalysis
- Visualization methods and tools for forensic analysis

***

General Chairs
Helmut Neukirchen - University of Iceland, Iceland
Kim-Kwang Raymond Choo - University of Texas at San Antonio, USA

Technical Program Committee Chairs
Thomas Welsh - University of Iceland, Iceland
Hans P. Reiser - Reykjavík University, Iceland
Raymond Chan - Singapore Institute of Technology, Singapore

***

This event is organized by EAI https://eai.eu/

EAI – European Alliance for Innovation is a non-profit organization
and a professional community established in cooperation with the
European Commission to empower the global research and innovation, and
to promote cooperation between European and International ICT
communities. 

Meeting on the Cybersecurity grants for Icelandic SME companies

Helmut Neukirchen, 17. November 2025

After successful two rounds of Cybersecurity grants for Icelandic SME companies, Icelandic Smaller and Middle-size Enterprises (SMEs) can now for a third time apply for cybersecurity-related funding. The call topics are the same as last time:

  • strengthening cybersecurity culture and awareness,
  • efficient education, research and development,
  • secure digital services and innovation,
  • stronger law enforcement, defense and national security,
  • effective response to incidents, and
  • strong infrastructure, technology and legal framework.

There is a meeting organised by Rannís:

17. November 2025, 9:00-10:15 at Arion Banki, Borgartúni 19, room Þingvellir.


This funding is in the context of the ECCC/EU co-funded project Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS). See also the official web page of Eyvör NCC-IS.


Two cybersecurity papers accepted: one at the 3rd International Conference on Foundation Models and Large Language Models (FLLM2025) and one at the 12th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2025)

Helmut Neukirchen, 11. November 2025

We have two research papers accepted: one at the 3rd International Conference on Foundation and Large Language Models (FLLM2025) and one at the 12th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2025) -- both conferences are co-located, saving CO2 footprint as only one presenter needs to fly to Vienna in order to present both papers.

  • Adetayo Adebimpe, Helmut Neukirchen, Thomas Welsh
    SBASH: a Framework for Designing and Evaluating RAG vs. Prompt-Tuned LLM Honeypots.
    The 3rd International Conference on Foundation and Large Language Models (FLLM2025), IEEE, to appear 2025.
    Download Postprint DOI: 10.48550/arXiv.2510.21459
  • Thomas Welsh, Kristófer Finnsson, Brynjólfur Stefánsson, Helmut Neukirchen
    Towards Socio-Technical Topology-Aware Adaptive Threat Detection in Software Supply Chains.
    The 12 International Conference on Social Networks Analysis, Management and Security (SNAMS 2025), IEEE, to appear 2025.
    Download Postprint DOI: 10.48550/arXiv.2510.21452


This research is in the context of our cybersecurity activities and the ECCC/EU co-funded projects ICEDEF – Defend Iceland and Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS).


Spark DGX

Helmut Neukirchen, 7. November 2025

While systems based on AMD AI max+ 395 are cheaper (and might in some cases even be faster), the NVIDIA Spark DGX systems have the advantage of providing the CUDA ecosystem. (However, if you just want to run LLMs, then Ollama and LM Studio support the AMD AI processors as well as CUDA.) Both system suffer from the fact, that standard DDR5 RAM is used (or to be more precise LPDDR5, i.e. soldered, instead of upgradable DIMMs).

I did some research on the Spark DGX

  • Comes with no 200 GB QSFP Direct Attach Cable (DAC) to cluster two of them without a 200 GB switch in-between, i.e. you need to buy an extra one.
  • enP7p1s0 is the Realteak-based 10 GB RJ45 Ethernet port. The others (enp1s0f0np0 enp1s0f1np1 enP2p1s0f0np0 enP2p1s0f1np1) are the two 200 GB QSFP56 ports, i.e. two 100 GB ports each are bundled into a 200 GB port).
  • Setup is described here: https://docs.nvidia.com/dgx/dgx-spark/first-boot.html
  • While it is setting up, it creates a WiFi AP (SSID shown a booklet that ships with the hardware) so that you can connect and create a user via a Web browser. It uses the Ethernet connection for installing OS updates. Once that setup has been finished, the WiFi AP gets disabled! You should be able to enable the AP again, e.g. using NetworkManager, but this will not NAT the WiFi AP client traffic via the Ethernet connection, i.e. while your WiFi AP client can access the DGX Spark, you cannot browse the Internet.
  • From the documentation:

    The machine name is your DGX Spark hostname with .local appended, such as spark-xxxx.local. You can find the default hostname on the Quick Start Guide that came in the box. The .local address uses mDNS (multicast DNS) to automatically locate your DGX Spark on the net-work without needing to know its IP address. This is particularly useful if your router periodically reassigns IP addresses.

    For Windows users: mDNS requires Bonjour Print Services from Apple. If you have iTunes or other
    Apple software installed, you likely already have this. Otherwise, you can download it from Ap-
    ple’s website. Alternatively, you can try using just the hostname without .local (such as spark-xxxx),
    though this method is less reliable on modern networks.

    Why .local might not work: .local hostnames may not work in enterprise networks with strict se-
    curity policies, networks that block multicast traffic, or other restricted network environments.

    Using an IP address instead: If .local hostnames do not work, you will need to use the IP address. To
    find the IP address, physically log in to your DGX Spark and click the network icon in the top right
    corner of the Ubuntu desktop. Select Settings from the dropdown menu, then navigate to the
    Network section. The IP address will be displayed under as "Realtek Ethernet". Click on the settings icon to see its IPv4 and IPv6 address.
    Alternatively, you
    can log in to your router’s administration console to view connected devices and their IP addresses.

  • AS this OS Ubuntu 2024.04 and uses Netplan for all network configuration.
    To change the hostname, you can either use the DGX Dashboard (see below and then Settings, System, Edit Hostname):

    sudo hostnamectl set-hostname new_hostname

    E.g.: sudo hostnamectl set-hostname spark1

    Restart the device or its services for the change to take effect.

    Further netplan commands: netplan get, netplan status --all

    To generate configuration files for all the involved network tools from the yaml file:
    sudo netplan generate. To try (will revert after 120 s): netplan try To finally apply persistently: netplan apply

  • Talking about Ubuntu: Release notes are available, but these refer both to the full-blown X86_64 DGX and the ARM64 DGX Spark, so search there for Spark. recovery media archive file is also available if you need to reinstall.
  • As this is standard Ubuntu, you will very likely need to do some variant of the usual hardening.
  • The https://build.nvidia.com/spark/connect-to-your-spark/sync NVIDIA Sync tool tunnels from your client machine via SSH to the DGX Spark: at the first usage of NVIDIA Sync, it will ask for your username and password: On Linux systems, it will then create a password-less SSH key (so that in future, NVIDIA Sync can tunnel without needing to ask for a password) and copy the public-key of the SSH key over to the DGX Spark (it will do so even if you already have an SSH key). On Mac or MS Windows system, it seems not to assume that there is support for password-less SSH keys.

    The NVIDIA Sync documentation contains some copy/paste instructions for Ubuntu/Debian of how add it as APT source: I do not like that they append it to sources.list -- I would rather make it file on its own in sources.list.d/. Also the provided deb entry might need to be changed into deb [arch=amd64] .

  • There seems to be an issue with the file /opt/nvidia/dgx-dashboard-service/jupyterlab_ports.yaml. But restarting the system after a user has been added, seems to help. The question is whether restarting some service using systemctl restart would do the same job as rebooting.
    Update: I tried systemctl restart dgx-dashboard.service (which will then ask for the sudo-enabled user to be used for that, incl. entering the password) and that did add the missing entry. sudo systemctl restart dgx-dashboard.service did not ask for the user to be used.
  • If there is permission issue with docker: sudo usermod -aG docker $USER
    newgrp docker
  • https://build.nvidia.com/spark Playbooks with first steps to play around.

    Start with activating Jupyter lab viah the DGX Dashboard. There seems to be an issue with the file /opt/nvidia/dgx-dashboard-service/jupyterlab_ports.yaml, though. Also, the sample AI workload will generate a warning concerning GPU NVIDIA GB10 which is of cuda capability 12.1 and Minimum and Maximum cuda capability supported by PyTorch is (8.0) - (12.0): that can be ignored.

The most common 4-digit PIN numbers

Helmut Neukirchen, 3. November 2025

I found a nice visualisation of the most common 4-digit PIN numbers, based on 3.4 million PIN numbers from several data breaches: The 20 most common numbers make up 27% of the commonly used PIN numbers, i.e. from those 3.4 million PIN numbers used by people, more than a quarter were from this set of 20 PINs.


	PIN	Freq
#1	1234	10.713%
#2	1111	6.016%
#3	0000	1.881%
#4	1212	1.197%
#5	7777	0.745%
#6	1004	0.616%
#7	2000	0.613%
#8	4444	0.526%
#9	2222	0.516%
#10	6969	0.512%
#11	9999	0.451%
#12	3333	0.419%
#13	5555	0.395%
#14	6666	0.391%
#15	1122	0.366%
#16	1313	0.304%
#17	8888	0.303%
#18	4321	0.293%
#19	2001	0.290%
#20	1010	0.285%

A more detailed analysis is also provided, e.g. dates are also likely, either years or MMDD / DDMM (Month, Day / Day, Month).

Rule of thumb: what comes into your mind as easy to remember (e.g. birth dates) is what also comes into the mind of others -- and might therefore be tried by someone guessing your PIN code. So: do not use these!

2024 Icelandic Software Developer Survey

Helmut Neukirchen, 31. October 2025

I just stumbled over the 2024 Icelandic Developer Survey: Compensation, Technologies, and more that was based asking members of an Icelandic SW developer Facebook group to fill out a survey.

Having been involved in other IT-related survey's in Iceland (e.g.: The state of cybersecurity vulnerability reporting in Iceland), this is interesting work.

ISO 4: standardised abbreviations used for words in scientific citations

Helmut Neukirchen, 23. October 2025

If page limit is an issue for you as an author of a scientific paper, then shortening references may be a way to squeeze out a few lines, e.g. using in the references section IEEE Trans. Softw. Eng. instead of IEEE Transactions on Software Engineering.

This is based on the ISO 4 standard: Words such as articles (the), conjunctions (and), and prepositions (for/of/in) are generally removed and a List of Title Word Abbreviations (LTWA) is used to abbreviate common title words.

You can look up the words in the LTWA at https://www.issn.org/services/online-services/access-to-the-ltwa/.

However, that list seems not be exhaustive: I have seen journals themselves using abbreviations not contained in the LTWA.

It therefore helps to search also for the full name and add as search term iso 4 or to check whether there is a Wikipedia article that contains the ISO 4 abbreviation or to look up the journal at https://www.resurchify.com/impact/details/ or at https://paperpile.com/guides/resources/abbreviations/

3rd funding round of Cybersecurity grants for Icelandic SME companies

Helmut Neukirchen, 6. October 2025

After successful two rounds of Cybersecurity grants for Icelandic SME companies, Icelandic Smaller and Middle-size Enterprises (SMEs) can now for a third time apply for cybersecurity-related funding. The call topics are the same as last time:

  • strengthening cybersecurity culture and awareness,
  • efficient education, research and development,
  • secure digital services and innovation,
  • stronger law enforcement, defense and national security,
  • effective response to incidents, and
  • strong infrastructure, technology and legal framework.

This funding is in the context of the ECCC/EU co-funded project Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS). See also the official web page of Eyvör NCC-IS.


Eclipse IDE icon (and font) size

Helmut Neukirchen, 15. September 2025

For teaching (and for my eyes on a 4K screen), I need sometimes the Eclipse IDE with larger icons and UI fonts (while the editor fonts can be easily adjusted within the Eclipse preferences, the icons cannot and while the UI fonts should be adjustable via Gnome settings, this did not work on my KDE/Plasma system).

What works for me (with X11 -- Wayland is a different thing) is described in https://linux-blog.anracom.com/2024/08/28/eclipse-too-small-icons-on-high-dpi-screens-workaround-for-kde-plasma-by-scaling-on-x11-and-wayland/

  • In the KDE display settings (at the very bottom of the configuration dialogue): set Global scale to 125% or 150%.
  • (Re-)Start eclipse via
     GDK_DPI_SCALE=0.5 GDK_SCALE=2 ./eclipse &

I also have in my home directory a .gtkrc-2.0 file and need to find out whether deleting it would change anything (i.e. global KDE/Plasma font size setting might then be used, but as long as .gtkrc-2.0 exists, this might override the KDE/Plasma font size setting) -- same applies for the gnome-tweaks command.

European Researchers' Night 2025 / Vísindavaka 2025

Helmut Neukirchen, 10. September 2025

On Saturday, 27. September 2024, 12:00-17:00, there was Vísindavaka 2025, the Icelandic family-friendly-during-daytime edition of European Researchers' Night 2026 at Laugardalshöll in Reykjavik.

The Computer Science department of University of Iceland had a couple of booths there, showcasing our activities in a way accessible for the general public.




Gagnabær ("Datatown") digital twin that visualises cyber attacks in Iceland. A LEGO model of Iceland representing critical infrastructure that is subject to attacks. Each time, a service on our Internet-connected computer is attacked via the Internet from anywhere in the world, a light goes off. So when all Iceland turns dark in our Lego model, then you know that all of our services are currently being attacked at the same time. We use just a dummy sample server, but in fact, it could be your computer or a power plant that is attacked. This relates to ICEDEF – Defend Iceland and Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS).


AI trained on a supercomputer, but running locally in the browser of your smartphone.
https://nvndr.csb.app/
The European Digital Innovation Hub Iceland (EDIH-IS) and the EuroCC co-funded National Competence Center (NCC) Icelandic High-Performance Computing (IHPC) provide give a glimpse into artificial intelligence by using a neural network that runs purely in your browser without any connection to a super computer. Simply use the camera of your smartphone (or laptop) to detect objects in real-time -- just open the following web page and allow your browser to use the camera: https://uice.is The used approach is a Single Shot Detector (SSD) (the percentage shows how sure the neural network is about the classification) using the Mobilenet neural network architecture. The dataset used for training is COCO (Common Objects in Context), i.e. only objects of the labeled object classes contained in COCO will get detected. The Javascript code that is running in your browser uses Tensorflow Lite and its Object Detection API and model zoo.

Another application of object detection (combined with object tracking): the organisers of the European Researcher's Night asked me to count the number of visitors by having a camera at the entrance that counts people entering and exiting. This was not showcased at a booth, but ran GDPR compliant (counting was done in real time and no video was recorded) in the background. As the camera was low resolution, the software had however some issues and was more reliable in counting people exiting than entering. Anecdotal evidence suggest, that children were not counted as these were simply too few pixels to be detected. It remains to be found out whether a higher resolution camera would improve the situation.


Beat the AI! A remote sensing demonstration that relates also to work done in EDIH-IS and IHPC where neural networks are used to classify land cover from satellite images, (Photo from Vísindavaka 2022)


In addition, we will have a booth on quantum computing -- this relates to our quantum encryption education activities as part of ICEDEF – Defend Iceland and Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS), but also to EDIH-IS and IHPC as quantum computing might be the future of supercomputing.

Our booths at the previous European Researchers' Nights:


Parts of this event are in the context of our cybersecurity activities and the ECCC/EU co-funded projects ICEDEF – Defend Iceland and Eyvör – the National Cybersecurity Coordination Centre of Iceland (NCC-IS).