<div dir="ltr"><div dir="ltr"><div><p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">The <b>16th EAI International Conference on Digital
Forensics & Cyber Crime (ICDF2C 2025</b>; <a href="https://icdf2c.eai-conferences.org/2025/" style="color:rgb(70,120,134)">https://icdf2c.eai-conferences.org/2025/</a>)
will be held between November 17 and 19, 2025 in Miami, Florida, USA. This
three-day event is expected to attract over 100 participants including
academics, practitioners, and vendors providing opportunities for business and
intellectual engagement among attendees. The focus is on the next generation
cyber analytics, security and forensics including the application and
deployment of contemporary technologies (e.g., Generative AI, and large
language model) in various security and forensic settings. The conference will
feature technical / research paper presentations and keynote speakers, as well
as a range of other exciting activities.</p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"><b> </b></p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"><b>Topics of Interest</b> include:</p>

<table class="gmail-MsoNormalTable" border="0" cellspacing="0" cellpadding="0" style="border-collapse:collapse">
 <tbody><tr>
  <td width="312" valign="top" style="width:233.75pt;border:1pt solid windowtext;padding:0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Applications of artificial intelligence (AI) and other
  related technologies:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Anti-forensics and anti-anti-forensics (e.g.,
       deepfake)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Deep learning</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Explainable AI (XAI)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Generative AI (GenAI)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Large language model (LLM)</li>
  </ul>
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Device forensics:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Blockchain investigations</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Internet of Things (IoT) forensics (including
       industrial IoT, medical IoT, military IoT, battlefield IoT, and
       vehicular IoT)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Edge and/or cloud forensics</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Network and distributed system forensics</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Virtual / augmented reality (VR/AR) forensics</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Other emerging / contemporary technologies (e.g.,
       hardware and software such as firmware and operating systems)</li>
  </ul>
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Financial crime investigations:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Financial frauds and scams</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Cryptocurrency investigations</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Market manipulation investigations</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Anti-money laundering / counter terrorism financing
       investigations</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Anti-corruption investigations</li>
  </ul>
  </td>
  <td width="312" valign="top" style="width:233.75pt;border-top:1pt solid windowtext;border-right:1pt solid windowtext;border-bottom:1pt solid windowtext;border-left:none;padding:0in 5.4pt">
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Cyber security and analytics:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Network security (e.g., intrusion detection)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Malware analysis</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">IoT security</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Security operations center</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Virtual / augmented reality (VR/AR)</li>
  </ul>
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Education and Evaluation:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Case studies – legal (e.g., child sexual abuse
       material) and/or technical</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Infrastructure</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Methodology</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Replicability and validity</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Tool validation</li>
  </ul>
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Theory and fundamentals:</p>
  <ul style="margin-top:0in;margin-bottom:0in" type="disc">
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Anti-forensics and anti-anti-forensics (e.g.,
       encryption and deepfake)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Frameworks (legal, policy, and/or technical)</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Privacy-preserving forensics</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Social and privacy</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Steganography and steganalysis</li>
   <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Visualization methods and tools for forensic analysis</li>
  </ul>
  <p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"> </p>
  </td>
 </tr>
</tbody></table>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"> </p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"><b>Important Dates</b></p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc">
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Full Paper Submission deadline: 31 May 2025</li>
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Notification deadline: 30 June 2025</li>
</ul>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"> </p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Submission information is available on <a href="https://icdf2c.eai-conferences.org/2025/call-for-papers/" style="color:rgb(70,120,134)">https://icdf2c.eai-conferences.org/2025/call-for-papers/</a>
and proceedings from previous years are available on <a href="https://link.springer.com/conference/icdf2c" style="color:rgb(70,120,134)">https://link.springer.com/conference/icdf2c</a>
</p>

<b><span style="font-size:12pt;font-family:Aptos,sans-serif"><br clear="all" style="break-before:page">
</span></b>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"><b> </b></p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"><b>Organizing Committee</b></p>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">General Chairs</p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc">
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Kim-Kwang Raymond Choo, University of Texas at San
     Antonio, USA</li>
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Alexander Perez-Pons, Florida International University,
     USA</li>
</ul>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Program Chairs</p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc">
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Rongxing Lu, Queen’s University, Canada</li>
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Kam Pui Chow, University of Hong Kong, Hong Kong</li>
 <li class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif">Himanshu Upadhyay, Florida International University,
     USA</li>
</ul>

<p class="MsoNormal" style="margin:0in;font-size:12pt;font-family:Aptos,sans-serif"> </p></div><div><div dir="ltr" class="gmail_signature"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><span style="font-size:12pt;font-family:Arial,sans-serif;color:rgb(34,34,34)"></span></div></div></div></div><p style="font-size:12.8px;margin-bottom:0.0001pt;background-image:initial;background-repeat:initial"><span style="font-size:9.5pt;font-family:Arial,sans-serif"></span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>