﻿{"id":6174,"date":"2026-04-01T16:39:36","date_gmt":"2026-04-01T16:39:36","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=6174"},"modified":"2026-04-02T09:59:13","modified_gmt":"2026-04-02T09:59:13","slug":"late-track-25th-april-2026-deadline-17th-eai-international-conference-on-digital-forensics-cyber-crime-in-reykjavik-iceland-8-10-september-2026","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2026\/04\/01\/late-track-25th-april-2026-deadline-17th-eai-international-conference-on-digital-forensics-cyber-crime-in-reykjavik-iceland-8-10-september-2026\/","title":{"rendered":"Late track 25th April 2026 deadline: 17th EAI International Conference on Digital Forensics &amp; Cyber Crime in Reykjavik, Iceland, 8 - 10 September, 2026"},"content":{"rendered":"<p>A late track submissions has been opened with new deadlines (this is strictly speaking not a deadline extension as the submissions of the first two rounds will be reviewed already now and notificated as planned):<\/p>\n<p><strong>Late track Submission deadline: 25th April 2026<\/strong><\/p>\n<p><strong>Late track Poster submission deadline: 25th April 2026<\/strong><\/p>\n<p><strong>Late track Notification: 17th May 2026<\/strong><\/p>\n<p><strong>Late track Camera ready: 30th May 2026<\/strong><\/p>\n<p>Also notice the <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/trust-and-deception-as-security-primitives\/\">Workshop Trust and Deception as Security Primitives<\/a> that has still submission open.<\/p>\n<p>In addition, there will be a <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/tutorial-autonomous-drone-systems-cybersecurity-and-threat-intelligence\/\">tutorial: Autonomous Drone Systems Cybersecurity and Threat Intelligence<\/a><\/p>\n<p>The <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\">17th EAI International Conference on Digital Forensics &amp; Cyber Crime (ICDF2C 2026)<\/a> will take place in Reykjavik, Iceland,  8 - 10 September, 2026. Hosted by the Computer Science department of University of Iceland. Proceedings published by Springer.<\/p>\n<p><a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\"><div id=\"attachment_5924\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5924\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2026\/01\/ICDF2CC_2026_late_track-670x356.jpg\" alt=\"\" width=\"670\" height=\"356\" class=\"alignright size-medium wp-image-6175\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2026\/01\/ICDF2CC_2026_late_track-670x356.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2026\/01\/ICDF2CC_2026_late_track-150x80.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2026\/01\/ICDF2CC_2026_late_track-768x408.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2026\/01\/ICDF2CC_2026_late_track.jpg 936w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><p id=\"caption-attachment-5924\" class=\"wp-caption-text\"><br \/>\nFor further details, check the <a href=\"https:\/\/icdf2c.eai-conferences.org\/2026\/\">conference web page<\/a>.<br \/><\/p><\/div><\/a><\/p>\n<p><a href=\"https:\/\/hi.cloud.panopto.eu\/Panopto\/Pages\/Viewer.aspx?id=3e9903ae-3c47-4262-9a50-b39801656123\"><div id=\"attachment_5935\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5935\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-670x374.png\" alt=\"\" width=\"670\" height=\"374\" class=\"size-medium wp-image-5935\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-670x374.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-1024x572.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-150x84.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-768x429.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video-1536x858.png 1536w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/Screenshot_video.png 1551w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><p id=\"caption-attachment-5935\" class=\"wp-caption-text\">Video introducing ICDF2C 2026 in Reykjavik, Iceland - Click to play<\/p><\/div><\/a><\/p>\n<p>For more details, check the <a href=\"https:\/\/uni.hi.is\/helmut\/2025\/11\/17\/17th-eai-international-conference-on-digital-forensics-cyber-crime-in-reykjavik-iceland-8-10-september-2026\/\">original call<\/a>.<\/p>\n<pre><code class=\"\" data-line=\"\">\nCALL FOR PAPERS Late track extended deadline (Apologies for cross-posting)\n\nEAI ICDF2C 2026: \n17th EAI International Conference on Digital Forensics &amp; Cyber Crime\npublication by Springer\n\nhttps:\/\/icdf2c.eai-conferences.org\/2026\/\n\nWhen: 8 - 10 September, 2026\n\nWhere: Reykjavik, Iceland\n\nLate track Submission deadline: 25th April 2026\n\nLate track Workshop submission deadline: 25th April 2026\n\nLate track Notification: 17th May 2026\n\nLate track Camera ready: 30th May 2026\n\n\nScope\n\nThe 17th EAI International Conference on Digital Forensics &amp; Cyber\nCrime (ICDF2C) will be held on 8-10 September, 2026, in Reykjavik\n(Iceland). This three-day event is expected to attract over 100\nparticipants, including academics, practitioners, criminologists (or\nlaw enforcement) and vendors, providing business and intellectual\nengagement opportunities among attendees. The conference is organized\nby the European Alliance for Innovation (EAI).\n\nThis conference&#039;s theme is cyber analytics and forensics in the era of\nemerging threats. Novel cyber threats are continuously emerging,\ncatalysed by the rapid deployment of Large Language Models and other\nAI across many domains which increases the threat surface in many\nsectors such as Smart Industry, Fintech and digital government. The\nfocus of this conference is to provide a platform for discussing these\nemerging threats and to identify priorities for the community to\ntarget with the next generation of cyber analytics. We particularly\nwelcome research which studies the dynamics between human factors and\nAI technologies and the corresponding impact upon cybersecurity and\nforensics.\n\nWe encourage the authors to use the Posters and Demos venue as a way to \nopen up discussions with the ICDF2C community about their early work in \nprogress and develop the work for future collaborations. \nRepresentatives from industry, including established companies and \nstartups, are warmly welcome to showcase products and services that \nare related to the topics of the conference.\n\n\nWorkshop: Trust and Deception as Security Primitives\nSocial engineering remains one of the most effective attack vectors \nagainst modern socio-technical systems, yet it is still poorly integrated \ninto formal security engineering practice. This workshop advances a \nunifying perspective that treats trust and deception as first-class \nsecurity primitives\u2014measurable, attackable, and engineerable system \nproperties across human, organizational, and AI-mediated environments.\n\nThe workshop brings together researchers and practitioners working on \nadversarial modeling, trust measurement, AI-mediated influence, \ndetection systems, and human-in-the-loop defenses. \nParticipants will examine how social engineering threats can be \nrigorously modeled, empirically evaluated, and mitigated using \ncomputational, organizational, and policy-aware approaches.\n\nThrough paper presentations and structured breakout discussions, \nthe workshop aims to (1) consolidate fragmented research threads \ninto a coherent socio-technical security framework, \n(2) identify shared metrics and evaluation challenges, and \n(3) define a research roadmap for defensible, trustworthy systems \nin high-consequence domains. \n\n\nTutorial: Autonomous Drone Systems Cybersecurity and Threat Intelligence\nAn intensive 4-hour program exploring critical intersections of \nautonomous drone technologies, cybersecurity vulnerabilities, and \nstrategic threat intelligence. Designed for cybersecurity professionals, \nintelligence analysts, and technology researchers seeking advanced \ninsights into drone system exploitation and defensive strategies.\n\n***\n\nPublication\n\nAll registered papers will be submitted for publishing by Springer \u2013\nLNICST series and made available through SpringerLink Digital Library:\nICDF2C proceedings.\n\nProceedings will be submitted for inclusion in leading indexing\nservices, such as Web of Science, Compendex, Scopus, DBLP, EU Digital\nLibrary, IO-Port, MatchSciNet, Inspec and Zentralblatt MATH.\n\nAll accepted authors are eligible to submit an extended version \nin a fast track of:\n- EAI Endorsed Transactions on Security and Safety\n- EAI Endorsed Transactions on Internet of Things\n\n***\n\nTopics\n\nTheme: Cyber analytics and forensics in the era of emerging threats.\n\nApplications of artificial intelligence (AI) and other related technologies:\n- Anti-forensics and anti-anti-forensics (e.g., deepfake)\n- Deep learning\n- Explainable AI (XAI)\n- Generative AI (GenAI)\n- Large language model (LLM)\n\nDevice forensics:\n- Blockchain investigations\n- Internet of Things (IoT) forensics \n (including industrial IoT, medical IoT, military IoT, battlefield IoT, and vehicular IoT)\n- Edge and\/or cloud forensics\n- Network and distributed system forensics\n- Virtual \/ augmented reality (VR\/AR) forensics\n- Other emerging \/ contemporary technologies \n (e.g., hardware and software such as firmware and operating systems)\n\nFinancial crime investigations:\n- Financial frauds and scams\n- Cryptocurrency investigations\n- Market manipulation investigations\n- Anti-money laundering \/ counter terrorism financing investigations\n- Anti-corruption investigations\n\nCyber security and analytics:\n- Network security (e.g., intrusion detection)\n- Malware analysis\n- IoT security\n- Security operations center\n- Virtual \/ augmented reality (VR\/AR)\n\nEducation and Evaluation:\n- Case studies \u2013 legal (e.g., child sexual abuse material) and\/or technical\n- Infrastructure\n- Methodology\n- Replicability and validity\n- Tool validation\n\nTheory and fundamentals:\n- Anti-forensics and anti-anti-forensics (e.g., encryption and deepfake)\n- Frameworks (legal, policy, and\/or technical)\n- Privacy-preserving forensics\n- Social and privacy\n- Steganography and steganalysis\n- Visualization methods and tools for forensic analysis\n\n***\n\nGeneral Chairs\nHelmut Neukirchen - University of Iceland, Iceland\nKim-Kwang Raymond Choo - University of Texas at San Antonio, USA\n\nTechnical Program Committee Chairs\nThomas Welsh - University of Iceland, Iceland\nHans P. Reiser - Reykjav\u00edk University, Iceland\nRaymond Chan - Singapore Institute of Technology, Singapore\n\n***\n\nThis event is organized by EAI https:\/\/eai.eu\/\n\nEAI \u2013 European Alliance for Innovation is a non-profit organization\nand a professional community established in cooperation with the\nEuropean Commission to empower the global research and innovation, and\nto promote cooperation between European and International ICT\ncommunities. \n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>A late track submissions has been opened with new deadlines (this is strictly speaking not a deadline extension as the submissions of the first two rounds will be reviewed already now and notificated as planned): Late track Submission deadline: 25th April 2026 Late track Poster submission deadline: 25th April 2026 Late track Notification: 17th May [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208,219,79],"tags":[],"class_list":["post-6174","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-organisational","category-research"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/6174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=6174"}],"version-history":[{"count":10,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/6174\/revisions"}],"predecessor-version":[{"id":6185,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/6174\/revisions\/6185"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=6174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=6174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=6174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}