Call for Posters and Demos

The 16th EAI International Conference on Digital Forensics & Cyber Crime invites Poster and Demo submissions on key topics in digital forensics, security, and risk management, offering a platform for valuable feedback to refine and advance your research.

This session aims at reporting on the progress of ongoing research and insights into the lessons learned from current digital forensics & cyber crime projects in a face-to-face, hands-on, and more informal setting. We invite a wide range of topics and types of work, including evaluations, methodologies, technological innovations, and design in the area of digital forensics & cybercrime. We encourage the authors to use the Posters and Demos venue as a way to open up discussions with the ICDF2C community about their early work in progress and develop the work for future collaborations. Representatives from industry, including established companies and startups, are warmly welcome to showcase products and services that are related to the topics of the conference.

Theme: Next generation cyber analytics and forensics.

Applications of artificial intelligence (AI) and other related technologies:
• Anti-forensics and anti-anti-forensics (e.g., deepfake)
• Deep learning
• Explainable AI (XAI)
• Generative AI (GenAI)
• Large language model (LLM)
Device forensics:
• Blockchain investigations
• Internet of Things (IoT) forensics (including industrial IoT, medical IoT, military IoT, battlefield IoT, and vehicular IoT)
• Edge and/or cloud forensics
• Network and distributed system forensics
• Virtual / augmented reality (VR/AR) forensics
• Other emerging / contemporary technologies (e.g., hardware and software such as firmware and operating systems)
Financial crime investigations:
• Financial frauds and scams
• Cryptocurrency investigations
• Market manipulation investigations
• Anti-money laundering / counter terrorism financing investigations
• Anti-corruption investigations
Cyber security and analytics:
• Network security (e.g., intrusion detection)
• Malware analysis
• IoT security
• Security operations center
• Virtual / augmented reality (VR/AR)
Education and Evaluation:
• Case studies – legal (e.g., child sexual abuse material) and/or technical
• Infrastructure
• Methodology
• Replicability and validity
• Tool validation
Theory and fundamentals:
• Anti-forensics and anti-anti-forensics (e.g., encryption and deepfake)
• Frameworks (legal, policy, and/or technical)
• Privacy-preserving forensics
• Social and privacy
• Steganography and steganalysis
• Visualization methods and tools for forensic analysis

Accepted and presented posters and demos will be submitted for publication by Springer and made available through SpringerLink Digital Library. Posters will be published as a part of the EAI ICDF2C 2025 Conference Proceedings in a non-indexed Annex section

Poster and demo submissions should be a maximum of 4 pages including references, figures, tables, and appendix.
The deadline for the submissions is July 14, 2025.

Please note that a shorter version of already published work is not suitable for this session. Authors willing to present a poster or a demo will submit a short paper, maximum of 4 pages in total (including references, figures, tables, appendixes etc.) describing their poster or demo. We expect most works to include a short introduction, a description of the employed methods and, if applicable, results.
Poster and demo papers must be formattedusing the Springer LNICST Authors’ Kit.
Instructions and templates are available from:
Please make sure that your paper adheres to the format as specified in the instructions and templates.
When uploading the camera-ready copy of your paper, please be sure to upload both:
  • a PDF copy of your paper formatted according to the above templates, and
  • an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
Scroll to Top