This conference delves into the transformative potential of blockchain technology in securing our digital future. We urge researchers, engineers, academics, and industry leaders from across the globe to converge and illuminate their breakthroughs and endeavours in various aspects of blockchain for digital forensics and cyber security. Through dedicated tracks focusing on specific areas like decentralized forensic platforms,blockchain-based intrusion detection, and Al-driven malware hunting, this conference fosters ground-breaking collaborations and sparks the next wave of innovation in securing our digital lives.
Submissions
Any submission needs to be explicitly marked as “Full paper” (scientific research papers, surveying works and industrial experiences describing significant advances) or “Short paper” (a work in paper that is no longer than 8 pages, including references). The unimplemented ideas can also be submitted in the form of posters. The author(s) may have to make a presentation on their posters at the venue specified during the conference. All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review process. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Proposals for special sessions, tutorials, and workshops should provide sufficient detail to evaluate them.
Award
Best papers are considered under each track based on the novelty of the topic, originality, innovativeness and presentation based on recommendation of the chair. 100% registration fee will be waived for the best paper awardees and a special certificate will also be offered.
Guidline
The manuscript must be in MS Word (.docx) format. NFSU journal of Cyber Security and Digital Forensics follow the paper template of IEEE standards. NFSU_JCSDF_PAPER_FORMAT
1. Create an Account (If Required):
If you are a new user, you will need to create an account in our Microsoft Conference Management system. Click [link to account creation if different from submission link] and follow the instructions.
2. Access the Submission Portal:
Go
to the submission portal: [Link to your Microsoft Conference Management submission portal.]
3. Prepare Your Manuscript:
Use our provided template: "NFSU_JCSDF_PAPER_FORMAT" (Highly Recommended)
Ensure your manuscript is in PDF
format.
The maximum file size is [10 MB].
4.Complete the Submission Form:
Enter all required information,
including:
Paper Title
Abstract (Max [Word/Character
Count])
Keywords (List at least [5])
Author Names and Affiliations
5. Upload Your Manuscript: Upload your
PDF file.
6. Review and Submit: Carefully review
all entered information before submitting.
7. Confirmation: You will receive a
confirmation email upon successful submission.
All submissions must be made
electronically through our Microsoft Conference Management system. Please use the following link to
access the submission portal: [Link to your Microsoft Conference Management submission portal].
The submission deadline is [25/03/2024]
Digital Forensics
Enhanced Evidence Custody
Al-powered Chain of Custody
Streamlined Investigations
Countering Emerging Threats
Emerging Trends and Applications
DeepFakes Debunked
Mining for Clues
Smart Contracts for Smart Forensics
Blockchain and Al for Reconstructing Past Events
The Forensically-Empowered Cloud
Cyber Security
Decentralized Security Infrastructures
Blockchain Forensics as a Service
Smart Contract Honeypots & Deception
Blockchain-based Threat Intelligence Sharing
Emerging Trends and Applications
Decentralized Intrusion Detection
Federated Learning for Anomaly Detection
Zero-Knowledge Proof for Identity Management
Malicious Blockchain Transactions Analysis
Cyberphysical System Security with ML & Blockchain
Secure data sharing
Authentication & Identity Management
Critical Infrastructure
Zero trust authentication
Ethical and Legal Considerations
Data Privacy and Ownership
Standardization and Regulations
Building Trust and Transparency
Emerging Trends and Applications
Cyber crime investigation
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.