Call for Paper

This conference delves into the transformative potential of blockchain technology in securing our digital future. We urge researchers, engineers, academics, and industry leaders from across the globe to converge and illuminate their breakthroughs and endeavours in various aspects of blockchain for digital forensics and cyber security. Through dedicated tracks focusing on specific areas like decentralized forensic platforms,blockchain-based intrusion detection, and Al-driven malware hunting, this conference fosters ground-breaking collaborations and sparks the next wave of innovation in securing our digital lives.

Types Of

Submissions

Any submission needs to be explicitly marked as “Full paper” (scientific research papers, surveying works and industrial experiences describing significant advances) or “Short paper” (a work in paper that is no longer than 8 pages, including references). The unimplemented ideas can also be submitted in the form of posters. The author(s) may have to make a presentation on their posters at the venue specified during the conference. All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review process. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Proposals for special sessions, tutorials, and workshops should provide sufficient detail to evaluate them.

Best Paper

Award

Best papers are considered under each track based on the novelty of the topic, originality, innovativeness and presentation based on recommendation of the chair. 100% registration fee will be waived for the best paper awardees and a special certificate will also be offered.

Authors

Guidline

The manuscript must be in MS Word (.docx) format. NFSU journal of Cyber Security and Digital Forensics follow the paper template of IEEE standards. NFSU_JCSDF_PAPER_FORMAT

"NFSU_JCSDF_PAPER_FORMAT"


Authors need to go through the following check points -


Manuscript - Provide clear research statement, observations and proposed solutions. Clearly explain the findings and impact of the research in particular research fields.

State the novelty and distinction of the submitted manuscript compare to previously published research. Provide appropriate and recent citations from the related research work done in past.
Type of submission – A research paper or a review paper should have original research findings with complete clarity of the techniques and methods for reproducibility.

Authors need to prepare and submit the manuscript as per the format provided by the journal only.

The Abstract - Research paper should be concise and it should reflect the research work. The Abstract must be self-contained and should be limited to 150 to 250 words.

The Abstract must be written in one paragraph and it should not include image, table and mathematical formulas. It should also include four to five different keywords which will help reader to find the specific research area.

ubmission - Authors need to do the proof reading of their manuscript before submission and confirm that all the figures, table content and equation are visible. On submission, the final manuscript cannot be changed in any case. A successful submission will be followed by an email confirmation to the corresponding author.

Ethics – It is responsibility of the authors to follow the research ethics and submit original research work. Submitted manuscript must not be submitted or under review process in any other journal or conference. All authors need to make sure that work is original and figures, tables and reports are original and perfectly reflect the experimental work. Authors have to provide appropriate citation to related research work.

Plagiarism of the manuscript will be checked through Turnitin Software and the same must match with the publication standards. Plagiarism must be less than 10%

Authors have to obtain all necessary approvals and have to follow ethics when treating human subjects and animals.

How to Submission

1. Create an Account (If Required):
If you are a new user, you will need to create an account in our Microsoft Conference Management system. Click [link to account creation if different from submission link] and follow the instructions.

2. Access the Submission Portal:
Go to the submission portal: [Link to your Microsoft Conference Management submission portal.]

3. Prepare Your Manuscript:
Use our provided template: "NFSU_JCSDF_PAPER_FORMAT" (Highly Recommended)
Ensure your manuscript is in PDF format.
The maximum file size is [10 MB].

4.Complete the Submission Form:
Enter all required information, including:
Paper Title
Abstract (Max [Word/Character Count])
Keywords (List at least [5])
Author Names and Affiliations

5. Upload Your Manuscript: Upload your PDF file.
6. Review and Submit: Carefully review all entered information before submitting.
7. Confirmation: You will receive a confirmation email upon successful submission.



Where to Submissions

All submissions must be made electronically through our Microsoft Conference Management system. Please use the following link to access the submission portal: [Link to your Microsoft Conference Management submission portal].

The submission deadline is [25/03/2024]

We invite researchers, practitioners, and industry experts to submit full paper addressing the following key areas:

Following Tracks:

Digital Forensics

Enhanced Evidence Custody
Al-powered Chain of Custody
Streamlined Investigations
Countering Emerging Threats
Emerging Trends and Applications
DeepFakes Debunked
Mining for Clues
Smart Contracts for Smart Forensics
Blockchain and Al for Reconstructing Past Events
The Forensically-Empowered Cloud

Following Tracks:

Cyber Security

Decentralized Security Infrastructures
Blockchain Forensics as a Service
Smart Contract Honeypots & Deception
Blockchain-based Threat Intelligence Sharing
Emerging Trends and Applications
Decentralized Intrusion Detection
Federated Learning for Anomaly Detection
Zero-Knowledge Proof for Identity Management
Malicious Blockchain Transactions Analysis
Cyberphysical System Security with ML & Blockchain
Secure data sharing
Authentication & Identity Management
Critical Infrastructure
Zero trust authentication

Following Tracks:

Ethical and Legal Considerations

Data Privacy and Ownership
Standardization and Regulations
Building Trust and Transparency
Emerging Trends and Applications
Cyber crime investigation

The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.