ISDFS 2025 : 13th International Symposium on Digital Forensics and Security
Call For Paper (CFP) Description
ISDFS is an IEEE technically supported premier event that brings together industry professionals, academics, and engineers to exchange information and ideas on digital forensics, cybersecurity, big data privacy and security, artificial intelligence in security and forensics, software engineering, signal processing, and computer science in general.
The symposium will be held by “Wentworth Institute of Technology” in Boston, Massachusetts, USA, and will be available ONLINE as well. Special sessions, workshops, tutorials, keynotes, panel discussions, posters, and oral presentations will be included in the symposium program.
All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library.
Topics within the scope of the symposium include, but are not limited to, the following areas:
Digital Forensics
Cyber Security
Data Privacy
Cryptography
Artificial Intelligence (AI) / Machine Learning (ML)
Big Data
Computer Science
Digital Forensics
Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection.
Cybersecurity
Steganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices.
Data Privacy
Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries.
Cryptography
Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero-Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography
Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side-Channel Analysis and Countermeasures, Pairing Based Cryptography, Key and Identity Management.
Artificial Intelligence (AI) / Machine Learning (ML)
Artificial Intelligence, Artificial/Deep Learning, Machine Learning, Data Science, AI and ML in Information, System and Cybersecurity, AI and ML in Privacy, AI and ML in Cybersecurity Applications, AI and ML in Steganography, AI and ML in Cryptography, AI and ML in 4G, LTE, and 5G networks, AI and ML in Operating System Security, AI and ML in Database Security.
Big Data
Big Data Security, Big Data Forensics, robust deep learning, secure deep learning/machine learning, multi-party computing, edge/fog computing, energy consumptions, high performance, heterogeneous resources, cloud models, heterogeneous architecture, telehealth, resource allocation, load balance, multimedia, and QoS.
Computer Science
Artificial Intelligence, Artificial/Deep Learning, Cloud Computing, Data Mining/Big Data, High-Performance Computing, Internet of Things, Virtual and Augmented Reality, Secure Systems, Signal/Image/Video Processing, Human-Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer Graphics, Programming Languages, Software Engineering, Theory of Computation.
At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2025 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented.
The symposium will be held by “Wentworth Institute of Technology” in Boston, Massachusetts, USA, and will be available ONLINE as well. Special sessions, workshops, tutorials, keynotes, panel discussions, posters, and oral presentations will be included in the symposium program.
All papers will be reviewed by at least three independent reviewers (single-blinded review). Accepted full papers will be submitted for publication in IEEE Xplore Digital Library.
Topics within the scope of the symposium include, but are not limited to, the following areas:
Digital Forensics
Cyber Security
Data Privacy
Cryptography
Artificial Intelligence (AI) / Machine Learning (ML)
Big Data
Computer Science
Digital Forensics
Digital Forensics Process Model, Information Systems and Crime Analysis, Business Application of Digital Forensics, Digital Forensics Techniques and Tools, Legal and Policy Issues Related to Digital Forensics, Digital Forensics Case Studies, Database Forensics, Cloud Forensics, Mobile & Multimedia Forensics, Network Forensics, Digital Forensics Training and Education, Big Data and Digital Forensics, Cyber Forensics, Digital Forensics Tool Testing and Validation Process, Digital Forensics Trends, Digital Forensics & Law, Anti and Counter Forensics, Data Hiding and Recovery, Cyber Crime Investigations, Cyber Culture & Cyber Terrorism, Incident Response, Information Warfare & Critical Infrastructure Protection.
Cybersecurity
Steganography and Steganalysis, Secure Multiparty Computation, Biometric Approaches, Computer Security, Mobile Communications Security, Operating System Security, Trusted Computing, Network Security, Wireless Security, Database Security, IPTV Security, E-commerce Protocols, Content filtering and tracing, Distributed System Security, Security Weaknesses on Information Technologies, Secure Code Development, Penetration Tests, Intrusion Detection Systems, Malicious Codes and spyware, Viruses, Spyware, Spamware, Scam, Energy/Cost/Efficiency of Security in Clouds, Security Risk Models and Clouds, Security Standards and Practices.
Data Privacy
Digital Signature, Certified Electronic Mail, Certificates and Certificate Management, Standards, Protocols, Trust Models, Key and Identity Management, Digital Signature Policies and Law, Validity of Digital Signature in Government, Finance, and Commerce, Effects of Digital Signature on Digital Signature Law, Responsibilities for Opponents to ESSP in Law in Digital Signature, Discrepancy between Digital Signatures, Judgments related to Digital Signatures, Digital Signature Law in Other Countries.
Cryptography
Block Ciphers, Stream Ciphers, Public Key Cryptography, Quantum Cryptography, Elliptic Curve Cryptography, Algebraic Curves in Cryptography, Homomorphic Encryption, Cryptographic Protocols, Zero-Knowledge, Secret Sharing, Cryptanalysis, Hash Functions, Applications of Coding Theory in Cryptography
Smart Card Applications and Security, Cryptographic Hardware and Embedded Systems, Special Purpose Hardware for Attacking Cryptographic Systems, Side-Channel Analysis and Countermeasures, Pairing Based Cryptography, Key and Identity Management.
Artificial Intelligence (AI) / Machine Learning (ML)
Artificial Intelligence, Artificial/Deep Learning, Machine Learning, Data Science, AI and ML in Information, System and Cybersecurity, AI and ML in Privacy, AI and ML in Cybersecurity Applications, AI and ML in Steganography, AI and ML in Cryptography, AI and ML in 4G, LTE, and 5G networks, AI and ML in Operating System Security, AI and ML in Database Security.
Big Data
Big Data Security, Big Data Forensics, robust deep learning, secure deep learning/machine learning, multi-party computing, edge/fog computing, energy consumptions, high performance, heterogeneous resources, cloud models, heterogeneous architecture, telehealth, resource allocation, load balance, multimedia, and QoS.
Computer Science
Artificial Intelligence, Artificial/Deep Learning, Cloud Computing, Data Mining/Big Data, High-Performance Computing, Internet of Things, Virtual and Augmented Reality, Secure Systems, Signal/Image/Video Processing, Human-Machine Interaction, Bioinformatics, Robotics, Social Networks, Algorithms and Data Structures, Game Theory, Soft Computing, Natural Language Processing, Operating System, Computer Graphics, Programming Languages, Software Engineering, Theory of Computation.
At the end of the symposium, a Best Paper Award and a Best Student Presentation Award will be granted by the ISDFS 2025 Program Committee. In order to qualify for the award(s), at least one of the authors must register and the paper(s) must be presented.
Conference Topics
Frequently Asked Questions
What is ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
ISDFS 2025 : 13th International Symposium on Digital Forensics and Security is Join us at ISDFS 2025, the 13th International Symposium on Digital Forensics and Security, to explore the latest advancements in digital forensics, cybersecurity, big data privacy, and more. Meet industry professionals, academics, and engineers to exchange ideas and information.
What topics are accepted at ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
The topics accepted at ISDFS 2025 : 13th International Symposium on Digital Forensics and Security include digital forensics, Data Privacy. Papers that explore innovative ideas or solutions in these areas are highly encouraged.
What are the important dates for ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
- Start Date: 24 Apr, 2025
- End Date: 25 Apr, 2025
- End Date: 25 Apr, 2025
What is the location and date of ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
ISDFS 2025 : 13th International Symposium on Digital Forensics and Security will be held on 24 Apr, 2025 - 25 Apr, 2025 at Boston, Massachusetts, USA. More details about the event location and travel arrangements can be found on the conference’s official website.
What is the location of ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
ISDFS 2025 : 13th International Symposium on Digital Forensics and Security will be held at Boston, Massachusetts, USA.
Can I submit more than one paper to ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
Yes, multiple submissions are allowed, provided they align with the conference’s themes and topics. Each submission will be reviewed independently.
What is the review process for submissions?
Papers will be reviewed by a panel of experts in the field, ensuring that only high-quality, relevant work is selected for presentation. Each paper will be evaluated on originality, significance, and clarity.
What presentation formats are available at ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
Presentations can be made in various formats including oral presentations, poster sessions, or virtual presentations. Specific details will be provided upon acceptance of your paper.
Can I make changes to my submission after I’ve submitted it?
Modifications to your submission are allowed until the submission deadline. After that, no changes can be made. Please make sure all details are correct before submitting.
What are the benefits of attending ISDFS 2025 : 13th International Symposium on Digital Forensics and Security?
Attending ISDFS 2025 : 13th International Symposium on Digital Forensics and Security provides an opportunity to present your research, network with peers and experts in your field, and gain feedback on your work. Additionally, it is an excellent platform for career advancement and collaboration opportunities.
What should I include in my abstract or proposal submission?
Your abstract or proposal should include a concise summary of your paper, including its purpose, methodology, and key findings. Ensure that it aligns with the conference themes.