Call for Papers

Paper Submission

Important dates

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

Late Track

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

The International Conference on Digital Forensics and Cyber Crime (ICDF2C 2025) will be held between November 17 and 19, 2025 in Miami, Florida, USA. This three-day event is expected to attract over 100 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The focus is on the next generation cyber analytics, security and forensics including the application and deployment of contemporary technologies (e.g., Generative AI, and large language model) in various security and forensic settings. The conference will feature technical / research paper presentations and keynote speakers, as well as a range of other exciting activities.

Theme: Next generation cyber analytics and forensics.

Applications of artificial intelligence (AI) and other related technologies:
• Anti-forensics and anti-anti-forensics (e.g., deepfake)
• Deep learning
• Explainable AI (XAI)
• Generative AI (GenAI)
• Large language model (LLM)
Device forensics:
• Blockchain investigations
• Internet of Things (IoT) forensics (including industrial IoT, medical IoT, military IoT, battlefield IoT, and vehicular IoT)
• Edge and/or cloud forensics
• Network and distributed system forensics
• Virtual / augmented reality (VR/AR) forensics
• Other emerging / contemporary technologies (e.g., hardware and software such as firmware and operating systems)
Financial crime investigations:
• Financial frauds and scams
• Cryptocurrency investigations
• Market manipulation investigations
• Anti-money laundering / counter terrorism financing investigations
• Anti-corruption investigations
Cyber security and analytics:
• Network security (e.g., intrusion detection)
• Malware analysis
• IoT security
• Security operations center
• Virtual / augmented reality (VR/AR)
Education and Evaluation:
• Case studies – legal (e.g., child sexual abuse material) and/or technical
• Infrastructure
• Methodology
• Replicability and validity
• Tool validation
Theory and fundamentals:
• Anti-forensics and anti-anti-forensics (e.g., encryption and deepfake)
• Frameworks (legal, policy, and/or technical)
• Privacy-preserving forensics
• Social and privacy
• Steganography and steganalysis
• Visualization methods and tools for forensic analysis

All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.

All accepted authors are eligible to submit an extended version in a fast track of:

By paying an additional $150, authors can publish their articles in the EAI Endorsed Transactions journal selected by the conference (Scopus and Ei-indexed).

The article’s publication is subject to the following requirements:
– It must be an extended version of the conference paper with a different title and abstract. In general, 30% of new content must be added.
– The article will be processed once the conference proceedings have been published.
– The article will be processed using the fast-track option.
– Once the conference proceedings are published, the corresponding author should contact us at [email protected] with the details of their article to begin processing.

Additional publication opportunities:

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

  • Regular papers should be up to 12-16 pages in length.
  • Short papers should be 6-11 pages in length.

All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.

How to Submit a Paper in Confy:
  1. Go to Confy+ website.
  2. Log in or sign up as a new user.
  3. Select your desired track.
  4. Click the ‘Submit Paper’ link within the track and follow the instructions.

Alternatively, go to the Confy+ homepage and click on “Open Conferences.”

Submission Guidelines:

  • All papers must be submitted in English. 
  • Previously published work cannot be submitted, nor can it be concurrently submitted to any other conference or journal. These papers will be rejected without review. 
  • Papers must follow the Springer formatting guidelines (available in the Author’s Kit section). 
  • Authors must read and agree to the Publication Ethics and Malpractice Statement.
  • As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)

HOW TO WRITE GOOD ALT TEXT

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:

  • a PDF copy of your paper formatted according to the above templates, and
  • an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
Scroll to Top