﻿{"id":5922,"date":"2025-11-17T21:38:23","date_gmt":"2025-11-17T21:38:23","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5922"},"modified":"2026-01-21T10:26:53","modified_gmt":"2026-01-21T10:26:53","slug":"17th-eai-international-conference-on-digital-forensics-cyber-crime-in-reykjavik-iceland-8-10-september-2026","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2025\/11\/17\/17th-eai-international-conference-on-digital-forensics-cyber-crime-in-reykjavik-iceland-8-10-september-2026\/","title":{"rendered":"Call for Papers: 17th EAI International Conference on Digital Forensics &amp; Cyber Crime in Reykjavik, Iceland,  8 - 10 September, 2026"},"content":{"rendered":"<p><strong>Update: A 2nd round for submissions has been opened with new deadlines<\/strong> (This is strictly speaking not a deadline extension as the submissions of the first round will be reviewed already now and notificated as planned):<\/p>\n<p><strong>Submission deadline: March 27 2026<\/strong><\/p>\n<p><strong>Notification: April 30 2026<\/strong><\/p>\n<p><strong>Camera ready: May 15 2026<\/strong><\/p>\n<p>The <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\">17th EAI International Conference on Digital Forensics &amp; Cyber Crime (ICDF2C 2026)<\/a> will take place in Reykjavik, Iceland,  8 - 10 September, 2026. Hosted by the Computer Science department of University of Iceland. Proceedings published by Springer.<\/p>\n<p><strong>Deadline for <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/call-for-workshop-proposals\/\">workshop proposals (includes tutorial or doctoral consortium)<\/a>: 5 December, 2025<\/p>\n<p>Notification of workshop proposal acceptance: 10 December, 2025<\/p>\n<p><a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/call-for-papers\/\">Paper submission<\/a> deadline: 20th January, 2026<\/p>\n<p><a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/call-for-posters-and-demos\/\">Poster and Demo submission<\/a> deadline: 30th of March, 2026.<br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\"><div id=\"attachment_5924\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5924\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/ICDF2C_Screenshot_2nd_Round_Deadlines-670x343.png\" alt=\"\" width=\"670\" height=\"318\" class=\"size-medium wp-image-5924\" \/><p id=\"caption-attachment-5924\" class=\"wp-caption-text\">For further details, check the <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\">conference web page<\/a>.<br \/>\nAs poster (with QR code and URL added, but currently still with deadlines from the first round) in: <a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/12\/ICDF2C_2026_poster_100dpi.jpg\">100 DPI JPG format<\/a>, <a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/ICDF2C_2026_poster_A4.pdf\">A4 format<\/a>, <a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/ICDF2C_2026_poster_A3.pdf\">A3 format<\/a>, <a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/ICDF2C_2026_poster_Legal.pdf\">US Legal format<\/a>, <a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/ICDF2C_2026_poster_Letter.pdf\">US Letter format<\/a>.<br \/><\/p><\/div><\/a><\/p>\n<p><a href=\"https:\/\/hi.cloud.panopto.eu\/Panopto\/Pages\/Viewer.aspx?id=3e9903ae-3c47-4262-9a50-b39801656123\"><div id=\"attachment_5935\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5935\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-670x374.png\" alt=\"\" width=\"670\" height=\"374\" class=\"size-medium wp-image-5935\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-670x374.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-1024x572.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-150x84.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-768x429.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-1536x858.png 1536w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video.png 1551w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><p id=\"caption-attachment-5935\" class=\"wp-caption-text\">Video introducing ICDF2C 2026 in Reykjavik, Iceland - Click to play<\/p><\/div><\/a><\/p>\n<pre><code class=\"\" data-line=\"\">\nCALL FOR PAPERS (Apologies for cross-posting)\n\nEAI ICDF2C 2026: \n17th EAI International Conference on Digital Forensics &amp; Cyber Crime\npublication by Springer\n\nhttps:\/\/icdf2c.eai-conferences.org\/2026\/\n\nWhen: 8 - 10 September, 2026\n\nWhere: Reykjavik, Iceland\n\nDeadline for workshop proposals\n(includes tutorial or doctoral consortium): 5 December, 2025\n\nNotification of workshop proposal acceptance: 10 December, 2025\n\nPaper submission deadline: 20th January, 2026\n\nPaper notification deadline: 25th April, 2026\n\nPaper camera-ready deadline: 15th May, 2026\n\nPoster and Demo submission deadline: 30th of March, 2026.\n\n\nScope\n\nThe 17th EAI International Conference on Digital Forensics &amp; Cyber\nCrime (ICDF2C) will be held on 8-10 September, 2026, in Reykjavik\n(Iceland). This three-day event is expected to attract over 100\nparticipants, including academics, practitioners, criminologists (or\nlaw enforcement) and vendors, providing business and intellectual\nengagement opportunities among attendees. The conference is organized\nby the European Alliance for Innovation (EAI).\n\nThis conference&#039;s theme is cyber analytics and forensics in the era of\nemerging threats. Novel cyber threats are continuously emerging,\ncatalysed by the rapid deployment of Large Language Models and other\nAI across many domains which increases the threat surface in many\nsectors such as Smart Industry, Fintech and digital government. The\nfocus of this conference is to provide a platform for discussing these\nemerging threats and to identify priorities for the community to\ntarget with the next generation of cyber analytics. We particularly\nwelcome research which studies the dynamics between human factors and\nAI technologies and the corresponding impact upon cybersecurity and\nforensics.\n\nPotential workshops may include: doctoral consortium for PhD students, \ntutorials such as password cracking for forensics, forensic education, \nforensic applications of AI, responding to an incident from a police \nor corporate interaction perspective, including what to expect when \nyou involve law enforcement.\n\nWe encourage the authors to use the Posters and Demos venue as a way to \nopen up discussions with the ICDF2C community about their early work in \nprogress and develop the work for future collaborations. \nRepresentatives from industry, including established companies and \nstartups, are warmly welcome to showcase products and services that \nare related to the topics of the conference.\n\n***\n\nPublication\n\nAll registered papers will be submitted for publishing by Springer \u2013\nLNICST series and made available through SpringerLink Digital Library:\nICDF2C proceedings.\n\nProceedings will be submitted for inclusion in leading indexing\nservices, such as Web of Science, Compendex, Scopus, DBLP, EU Digital\nLibrary, IO-Port, MatchSciNet, Inspec and Zentralblatt MATH.\n\nAll accepted authors are eligible to submit an extended version \nin a fast track of:\n- EAI Endorsed Transactions on Security and Safety\n- EAI Endorsed Transactions on Internet of Things\n\n***\n\nTopics\n\nTheme: Cyber analytics and forensics in the era of emerging threats.\n\nApplications of artificial intelligence (AI) and other related technologies:\n- Anti-forensics and anti-anti-forensics (e.g., deepfake)\n- Deep learning\n- Explainable AI (XAI)\n- Generative AI (GenAI)\n- Large language model (LLM)\n\nDevice forensics:\n- Blockchain investigations\n- Internet of Things (IoT) forensics \n (including industrial IoT, medical IoT, military IoT, battlefield IoT, and vehicular IoT)\n- Edge and\/or cloud forensics\n- Network and distributed system forensics\n- Virtual \/ augmented reality (VR\/AR) forensics\n- Other emerging \/ contemporary technologies \n (e.g., hardware and software such as firmware and operating systems)\n\nFinancial crime investigations:\n- Financial frauds and scams\n- Cryptocurrency investigations\n- Market manipulation investigations\n- Anti-money laundering \/ counter terrorism financing investigations\n- Anti-corruption investigations\n\nCyber security and analytics:\n- Network security (e.g., intrusion detection)\n- Malware analysis\n- IoT security\n- Security operations center\n- Virtual \/ augmented reality (VR\/AR)\n\nEducation and Evaluation:\n- Case studies \u2013 legal (e.g., child sexual abuse material) and\/or technical\n- Infrastructure\n- Methodology\n- Replicability and validity\n- Tool validation\n\nTheory and fundamentals:\n- Anti-forensics and anti-anti-forensics (e.g., encryption and deepfake)\n- Frameworks (legal, policy, and\/or technical)\n- Privacy-preserving forensics\n- Social and privacy\n- Steganography and steganalysis\n- Visualization methods and tools for forensic analysis\n\n***\n\nGeneral Chairs\nHelmut Neukirchen - University of Iceland, Iceland\nKim-Kwang Raymond Choo - University of Texas at San Antonio, USA\n\nTechnical Program Committee Chairs\nThomas Welsh - University of Iceland, Iceland\nHans P. Reiser - Reykjav\u00edk University, Iceland\nRaymond Chan - Singapore Institute of Technology, Singapore\n\n***\n\nThis event is organized by EAI https:\/\/eai.eu\/\n\nEAI \u2013 European Alliance for Innovation is a non-profit organization\nand a professional community established in cooperation with the\nEuropean Commission to empower the global research and innovation, and\nto promote cooperation between European and International ICT\ncommunities. \n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Update: A 2nd round for submissions has been opened with new deadlines (This is strictly speaking not a deadline extension as the submissions of the first round will be reviewed already now and notificated as planned): Submission deadline: March 27 2026 Notification: April 30 2026 Camera ready: May 15 2026 The 17th EAI International Conference [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208,219,79],"tags":[],"class_list":["post-5922","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-organisational","category-research"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5922"}],"version-history":[{"count":54,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5922\/revisions"}],"predecessor-version":[{"id":6085,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5922\/revisions\/6085"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}