<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><p class="MsoNormal" style="text-align:center;margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b style="font-size:12pt"><span style="font-size:16pt;font-family:Cambria,serif;color:rgb(0,111,192)">2<sup>nd</sup>
International Workshop on Cyber Forensics and Threat Investigations Challenges</span></b><br></p><p class="MsoNormal" align="center" style="text-align:center;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-family:"Times New Roman",serif"></span></p><p style="text-align:center;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;font-family:Cambria,serif;color:rgb(0,111,192)"><b>                     </b></span><span style="font-size:12pt;text-align:center"><b>October 10-11, 2022, Taking
Place Virtually from the UK</b></span></p><p style="text-align:center;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><a href="https://easychair.org/cfp/CFTIC2022" target="_blank">https://easychair.org/cfp/CFTIC2022</a><span style="font-size:12pt;text-align:center"><b><br></b></span></p><p style="text-align:center;margin:0cm 0cm 0.0001pt;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;text-align:center"><br></span></p><p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Cyber forensics and threat
investigations has rapidly emerged as a new field of research to provide the
key elements for maintaining security, reliability, and trustworthiness of the
next generation of emerging technologies such as the internet of things,
cyber-physical systems, cloud/edge/fog computing, software-defined network, and
network function virtualization. Complicated efforts are required in suitable
and timely manners against any threats detected within these systems. Moreover,
new frameworks are required to collect and preserve potential evidential data
in suitable and timely manners as well. To guarantee proper cyber-defenses and
strategies against the expanding landscape of criminal activities as well as
rapidly advancing emerging technologies. </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The main motivation for
this Workshop is to bring together researchers and practitioners working on
cyber forensics and threat investigations for emerging infrastructures to
disseminate current research issues and advances. Original technical papers describing
new, state-of-the-art research, will be considered. The Workshop welcomes
submissions that evaluate existing research results by reproducing experiments.
The aim of this workshop is to provide insight for the discussion of the major
research challenges and achievements on various topics of interest.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(41,128,185)">Important Dates</span></u></b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(41,128,185)">   </span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">           <b> </b></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Technical Paper Submission
Deadline: </span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">15 September 2022</span></b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Poster and Demo Track
Submission Deadline: </span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">20 September 2022</span></b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Authors
Notifications: </span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">30 September 2022</span></b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Camera Ready due: </span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:rgb(231,76,60)">05
October 2022</span></b></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The registration is </span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:red">free-off-charge
</span></b><b><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">for All members of the Association </span></b><b style="font-size:12pt"><span style="font-size:8pt;font-family:Verdana,sans-serif;color:black">(Thanks to our financial
supporters who made this possible)</span></b></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt 20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Scope of
The Workshop</span></p>

</div>

<div style="border-top:none;border-right:none;border-bottom:none;border-left:6pt solid rgb(0,107,173);padding:0cm 0cm 0cm 20pt;background:rgb(202,217,226);margin-left:20pt;margin-right:0cm">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span style="font-size:16.5pt;font-family:Arial,sans-serif;color:rgb(0,95,152)">Technical Paper Track</span></u></b><span style="font-size:16pt;font-family:Verdana,sans-serif;color:rgb(0,95,152)"></span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Papers on practical as well
as theoretical topics and problems in various topics related to cyber forensics
and threat investigations are invited, with special emphasis on novel
techniques and tools to collect data from networked systems and services in
emerging technologies (such as the ones can be found in cyber-physical systems
and Internet of things, cloud/edge/fog computing, software-defined network, and
network function virtualization). Topics include (but are not limited to):</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in IoT</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in peer-to-peer, and social networks</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in SDN/NFV</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in Cloud Computing</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in Smart Technologies Systems (Smart Cars, Smart Homes, Smart
Cities)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Dark Web Investigations,
Forensics, and Monitoring</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in Virtual private networks</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and Privacy in
Clouds, Fog Computing, and 5G, and 6G</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and Privacy in
IoT, SDN/NFV, and Edge Computing</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Security and Privacy in
Smart Technologies Systems (Smart Cars, Smart Homes, Smart Cities) </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and visualization
of Big Data</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Trusted Computing in Smart
Technologies Systems (Smart Cars, Smart Homes, Smart Cities)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Tools and services for
cyber forensics and threat investigations</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">OSINT (Open Source
Intelligence)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Cooperative and distributed
forensics and threat investigations</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Advanced threat
investigations, forensic and anti-forensic techniques</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Attack detection, traceback
and attribution in Emerging Technologies</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Malware Analysis and Attribution</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Digital Evidence
Extraction/Analysis using Artificial intelligence, Machine Learning and Data
Mining</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Data exfiltration
techniques from networked devices and services (e.g. cyber-physical systems,
and Internet-of-Things)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Methods for reconstruction
of Digital Evidence in Emerging Technologies</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Forensics and threat
investigations in E-health/M-health</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Vulnerability & threat
detection and mitigation techniques for networked services</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 21.3pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Novel large-scale
investigations and Machine Learning techniques to analyze intelligence data
sets and logs</span></p><p class="MsoNormal" style="margin:0cm 0cm 9pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">We also
encourage contributions describing innovative work in the realm of
cybersecurity, cyber defense, and digital crimes.</span></p>

<div style="border-top:none;border-right:none;border-bottom:none;border-left:6pt solid rgb(0,107,173);padding:0cm 0cm 0cm 20pt;background:rgb(202,217,226);margin-left:20pt;margin-right:0cm">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><b><u><span style="font-size:16.5pt;font-family:Arial,sans-serif;color:rgb(0,95,152)">Poster and Demo Track</span></u></b><span style="font-size:16pt;font-family:Verdana,sans-serif;color:rgb(0,95,152)"></span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">CFTIC 2022 solicits the
submission of posters and demos on specific aspects of cyber forensics and
threat investigations, particularly related to the subject areas indicated by
the CFTIC 2022 topics of interest. Posters provide a forum for authors to
present their work in an informal and interactive setting. They allow authors
and interested participants to engage in discussions about their work. In
particular, a poster submission should motivate its relevance to the
communities of cyber forensics and threat investigations, and summarize the
main challenges, experiences, and novel ideas. A demonstration should present
an existing tool or research prototype. Authors are expected to provide a
demonstration during the poster and demonstration session. A demonstration
submission should clearly describe the motivation, the novelty of the
contribution, and the applicability of the tool or prototype to specific use
cases. Posters or demonstrations can be submitted for evaluation in the form of
an extended abstract. Submissions are limited to 1 page including references.
All submissions must present only original and unpublished work that is not
currently under review at any other venue. Demonstrations must include in the
abstract of the paper a link to a video of up to 5 minutes hosted in a
permanent location. The video must show the existing tool or research prototype
in action. Moreover, demonstrations are encouraged to include a link to a
website where the source code of the produced software is available when it is
possible.</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt 20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Submission</span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Paper submissions must
present original research or experiences. Late-breaking advances and
work-in-progress reports from ongoing research are also encouraged. Only
original papers that have not been published or submitted for publication
elsewhere can be submitted. Also, extended versions of conference or workshop
papers that are already published may be considered as long as the additional
contribution is at least 30% new content from the original. Each submission
must be written in English, accompanied by a 75 to 200-word abstract, and a
list of up to 5 keywords. There is a length limitation of 4 pages (at least
10pt font, one-column format) for extended abstracts including (title,
abstract, figures, tables, and references). Submissions must be in ECEASST-CFTIC
2022 template. Authors should submit their papers electronically via the </span><a href="https://easychair.org/conferences/?conf=cftic2022" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">EasyChair online
submission system</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 1cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><a href="https://conceptechint.net/ECEASST-cls-XXX-CFTIC-2022.zip" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">ECEASST-CFTIC-Latex-Template</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.0001pt 1cm;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:10pt;font-family:Symbol;color:black">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       
</span></span><span dir="LTR"></span><a href="https://conceptechint.net/ECEASST-%20CFTIC-2022.doc" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">ECEASST-CFTIC-Word-Template</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">The submission processes will be managed
by </span><a href="https://easychair.org/conferences/?conf=cftic2022" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">easychair</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"> If you
have used this system before, you can use the same username and password. If
this is your first time using EasyChair, you will need to register for an
account by clicking the “I have no EasyChair account” button. Upon completion of
registration, you will get a notification email from the system and you are
ready for submitting your paper. You can upload and re-upload the paper to the
system.</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt 20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;font-family:Verdana,sans-serif;color:white">Publication</span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;text-align:justify;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">CFTIC 2022 proceedings are
to be published open access via the Electronic Communications of the EASST
Journal (ECEASST) indexed in <b>Scopus</b>, <b>DBLP,</b> and
listed in the <b>Directory of Open Access Journals (DOAJ)</b>. Selected
papers presented at the workshop, after further revision, will have the
opportunity to be published in special issues in indexed and/or high-impact
factor journals (details on the website).</span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt 20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span style="color:white;font-family:Verdana,sans-serif;font-size:16pt">Main
Contact</span><br></p></div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">If you have any further questions please contact
the workshop organizers via </span><a href="https://www.acfti.org/contact" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">https://www.acfti.org/contact</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black"></span></p>

<div style="border:1pt solid rgb(0,114,161);padding:4pt 0cm 6pt 20pt;background:rgb(0,114,161)">

<p class="MsoNormal" style="margin:7pt 0cm 6pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;border:none;padding:0cm;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;font-family:Verdana,sans-serif;color:white">This
Workshop is Technically Supported by</span></p>

</div>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Association of Cyber Forensics and Threat
Investigators (</span><a href="https://www.acfti.org/" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">www.acfti.org</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">)</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 9pt 10pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:12pt;font-family:Calibri,sans-serif"><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">Industrial Cybersecurity Center (</span><a href="https://www.cci-es.org/" style="color:blue" target="_blank"><span style="font-size:11pt;font-family:Verdana,sans-serif">www.cci-es.org</span></a><span style="font-size:11pt;font-family:Verdana,sans-serif;color:black">)</span></p><div><span style="font-family:verdana,sans-serif"><br></span></div><div><span style="font-family:verdana,sans-serif">Send by </span><span style="font-family:verdana,sans-serif">Andrew Zayin </span><span style="font-family:verdana,sans-serif">on Behalf of CFTIC2022 PC Chairs.</span><br></div><div><span style="font-family:verdana,sans-serif"><br></span></div><div><span style="font-family:verdana,sans-serif">Andrew Zayin Ph.D, CISSP, CISM, CRISC, CDPSE, PMP</span><br></div><div><font face="verdana, sans-serif">________________________________________________________<br>Association of Cyber Forensics and Threat Investigators<br><a href="https://www.acfti.org/" rel="noreferrer" target="_blank">https://www.acfti.org</a><br>Twitter: @acfti</font></div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>