Shape the conversation
We are delighted to announce the International Conference on Intelligent Digital Forensics and Cybersecurity, a premier global forum bringing together scholars, industry leaders, practitioners, and policymakers to explore the intersection of forensic science, cybersecurity defense, and threat intelligence. IDFC 2026 invites researchers, students, and professionals to organize high-impact workshops in Trento, Italy, September 1-4, 2026.
Evaluation criteria
- Potential to generate new results and collaborations
- Interactive format and community interest
- Timeliness and research significance
- Organizer track record & ability to deliver
Suggested Workshop Topics
Workshop proposals addressing (but not limited to) the following areas are welcome.
Advanced Digital Forensics
- Memory, firmware, and hardware-assisted forensics
- Live forensics and real-time evidence acquisition
- Cross-platform and cross-device forensic correlation
- Timeline reconstruction and event attribution at scale
- Forensics for encrypted, ephemeral, and volatile data
- Automated triage and prioritization of digital evidence
- Multimedia forensics (image, video, audio, and sensor data)
- Forensics for cyber-physical systems and smart infrastructures
Next-Generation Cybersecurity and Cyber Defense
- AI-driven cyber defense and autonomous response systems
- Adversarial attacks against security systems and AI models
- Post-quantum cryptography and forensic readiness
- Cyber deception, honeypots, and active defense strategies
- Supply-chain attacks and software integrity verification
- Detection and mitigation of insider threats
- Security for 5G/6G networks and edge computing
- Cyber resilience and recovery modeling
AI and Machine Learning for Security and Forensics
- Foundation models for security analytics
- Multimodal AI for forensic reasoning and correlation
- Continual, online, and adaptive learning in forensic systems
- Robust ML against poisoning and evasion attacks
- Human-in-the-loop AI for investigative decision support
- Causal AI for cyber incident attribution
- Trust, fairness, and bias analysis in forensic AI
- Benchmarking datasets and evaluation metrics for forensic AI
Generative AI and Synthetic Media Forensics
- Detection, attribution, and provenance of AI-generated content
- Deepfake forensics for images, video, voice, and text
- Watermarking, fingerprinting, and content authenticity verification
- Generative AI for attack simulation and red teaming
- Generative models for reconstructing missing or damaged evidence
- Prompt forensics and analysis of LLM misuse
- Adversarial generative models and forensic countermeasures
- Forensics of AI agents and autonomous systems
Privacy-Preserving, Distributed, and Trustworthy Forensics
- Federated and decentralized forensic learning
- Secure multi-party computation for investigations
- Homomorphic encryption in forensic analytics
- Confidential computing and trusted execution environments
- Privacy-preserving evidence sharing across organizations
- Secure data collaboration between law enforcement and industry
- Transparency, auditability, and reproducibility in forensic systems
Blockchain, Web3, and Financial Crime Forensics
- Smart contract analysis and vulnerability forensics
- Cryptocurrency tracing and transaction graph analysis
- DeFi fraud, rug pulls, and NFT-related crimes
- Forensics for decentralized identity (DID) systems
- Tokenomics manipulation and market abuse detection
- Cross-chain forensic analysis and interoperability challenges
IoT, Edge, and Cyber-Physical System Forensics
- Forensics for smart homes, vehicles, drones, and wearables
- Industrial IoT (IIoT) and critical infrastructure forensics
- Edge AI security and forensic challenges
- Digital twins for forensic reconstruction
- Sensor data integrity and provenance verification
Human, Social, and Cognitive Dimensions of Cybercrime
- Social engineering and phishing analysis using AI
- Behavioral analytics for insider threat detection
- Cognitive forensics and decision-making under uncertainty
- Misinformation, disinformation, and influence operations
- Online radicalization and coordinated inauthentic behavior
Legal, Ethical, and Policy Perspectives
- Legal implications of AI-generated evidence
- Explainability requirements for AI in court proceedings
- Standards and certification for forensic AI tools
- Accountability and liability in automated investigations
- Cross-border evidence sharing and digital sovereignty
- Ethics-by-design for intelligent forensic systems
- Policy frameworks for regulating generative AI misuse
Applied Systems, Tools, and Case Studies
- End-to-end forensic platforms and real-world deployments
- National and international cybercrime case studies
- Public-private collaboration models in cyber investigations
- Evaluation of forensic tools in operational environments
- Lessons learned from large-scale cyber incidents
Visionary and Emerging Topics
- Self-healing and self-forensic cyber systems
- Autonomous cyber investigators and AI agents
- Forensics for metaverse and extended reality (XR) environments
- Digital trust ecosystems and evidence provenance at scale
- The future of cyber forensics in an AI-native world
Privacy-Preserving Federated Learning
- Federated learning for collaborative forensic analysis
- Differential privacy in distributed cyber investigations
- Secure multi-party computation for evidence sharing
- Privacy-aware threat intelligence aggregation
- Homomorphic encryption for forensic data processing
Proposal Requirements
Submit a single PDF (up to 4 pages, the official conference format) including:
- Workshop title
- Organizers: names, affiliations, emails, phones; attendance likelihood
- Technical description: scope, topics, planned activities; why now
- Format & resources: half-/full-day, expected attendance, room size, panel/posters needs
- Tentative PC & selection process for participants/presenters
- Tentative CFP with timeline (submissions, notifications, potential speakers/keynotes)
- If applicable: history of prior editions (venue, URLs, attendance)
- Organizer bios (short), highlighting expertise and relevant experience
How to Submit
Email your PDF proposal with the subject line:
Workshop Proposal — [Your Title]
You'll receive confirmation and next-step guidance from the workshop chairs.
Organizer Responsibilities
- Community outreach & advertising (beyond the main IDFC channels)
- Workshop website creation & maintenance
- Submission collection and peer review coordination
- Camera-ready and copyright coordination
- On-site moderation and schedule management
Important Dates (Workshops)
All deadlines are AoE unless noted otherwise.
| # | Event | Date |
|---|---|---|
| 1 | Workshop Proposal Submission | February 20th, 2026 |
| 2 | Workshop Notification | March 10th, 2026 |
| 3 | Workshop Paper Submission | June 20th, 2026 |
| 4 | Paper Notification | July 20th, 2026 |
| 5 | Camera-Ready Submission | July 30th, 2026 |