Join Our Mailing-List

The ACFTI is a non-profit technical organisation dedicated to the advancement of the cross-disciplinary fields of cybersecurity, digital forensics, incident response, and threat investigations. It is a resource and support network promoting critical and scholarly research independent from traditional disciplines and existing cross academic borders. The association is international in scope.

The ACFTI mailing-list is an opt-in mailing list hosted on Concept Tech Int. Ltd servers and is available to all academics and practitioners involved in the fields of cybersecurity, digital forensics, incident response, and threat investigations. Only those that opt-in (subscribe) may receive posts from the list. The mailing list is used only for topics directly related to the fields of cybersecurity, digital forensics, incident response, and threat investigations. It may include issues in curriculum design and developments, open research & academic positions, new journals, conferences CFP, and new research topics.

Questions and/or Posts to the mailing list should be addressed to acfti (at) conceptechint (dot) net

Instructions to Join/ leave the mailing list

TO JOIN (subscribe to) the mailing list, click on this link to access the "notification mailing list" subscription form or paste this URL in your browser

Enter your email address and a short bio about yourself with links to your Linkedin profile or website, then click submit. Confirmation of subscription should be received immediately or within 48 hours. Please click on the link provided in the confirmation email to confirm the request and to add the provided email address to the mailing list.

It is important to keep this email since It contains the unsubscribe link (this action may be required later or in the future). By subscribing, you agree to the mailing list policy, which is as follows:

  • Only matters relating to the research and curriculum of cybersecurity, digital forensics, incident response, and threat investigations should be covered in emails sent through the mailing-list.

  • Inappropriate language will not be tolerated.

  • Anyone violating the above will be removed from the mailing-list.

TO LEAVE (unsubscribe from) the mailing list, go to the received email "Confirmation of subscription", then click on the link under the "stop receiving notification emails" section.

Questions and/or Posts to the mailing list should be addressed to acfti (at) conceptechint (dot) net

Submission guidelines to read before sending any Job or CFP posts

Journal/Conference/Workshop - Call for Papers

To have a conference/journal distributed on the ACFTI mailing-list, please submit an ASCII text version of the CFP to

acfti (at) conceptechint (dot) net.

Your email message should contain the name of the journal/conference/workshop, the exact date it is being held and the submission deadline including the year, place, a concise text version of the call-for-papers, and a URL for the journal/conference/workshop website.

The following is an example of an acceptable Call-for-papers:

[CFATI 2020] 1st International Workshop on Cyber Forensics and Advanced Threat Investigations in Emerging Networks to be held in conjunction with the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) Madeira, Portugal, November 2-5, 2020.

The main motivation for this Workshop is to bring together researchers and practitioners working on cyber forensics and threat investigations for emerging networks to disseminate current research issues and advances. Original technical papers describing new, state-of-the-art research will be considered. The Workshop welcomes submissions that evaluate existing research results by reproducing experiments. The aim of this workshop is to provide insight for the discussion of the major research challenges and achievements on various topics of interest. Papers on practical as well as on theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from networked devices and services in emerging networks (such as the ones can be found in cyber-physical systems and Internet of things). Topics include (but are not limited to):

  • Advanced threat investigations, forensic and anti-forensic techniques

  • Cooperative and distributed forensics and threat investigations

  • Data exfiltration techniques from networked devices and services (e.g. cyber-physical systems, and Internet-of-Things)

  • Attack detection, traceback, and attribution in SDN, 5G, and 6G

  • Methods for reconstruction of internet activities in SDN, 5G, and 6G

  • Forensics and threat investigations in IoT

  • Forensics and threat investigations in peer-to-peer, social, and cloud networks

  • Vulnerability & threat detection and mitigation techniques for networked services

  • Novel large-scale investigations techniques to analyze intelligence data sets and logs

  • Tools and services for cyber forensics and threat investigations

  • VoIP forensics, VoIPoW forensics

For more information, please check the workshop website

Research & Academic Positions- Posts

To have post for research & academic positions distributed in the ACFTI mailing-list, please submit an ASCII text version of the post to

acfti (at) conceptechint (dot) net.

Your email message should contain the job type, the field, the employer and location in a concise text version of the job post, and a URL for more information and applying.

The following is an example of an acceptable job post for research & academic positions:

NYU Center for Cybersecurity is looking for post-doctoral researchers interested in the intersection of machine learning, computer vision, and security. The Center for Cybersecurity specializes in media security applications (e.g., detection of falsified or synthetic media) and aims to explore novel approaches to verification and assurance of media integrity in next-generation multimedia systems. Successful candidates should be capable of independent research, formulation of new research problems, and rapid prototyping in a collaborative environment. Appointments for a minimum of 2 years. Position to be filled immediately. Required skills:

  • PhD in computer vision / machine learning / signal processing / security / etc.

  • Track record of publications in top venues in your field

  • Strong programming skills (Python / Tensorflow)

  • Strong communication and technical writing skills

Before applying, please reach out to Prof. ABCD <> or EFGH <>. For more information about the benefits & the application process, please refer to:

The ACFTI mailing-list RULES:

CFATI is an email list owned and operated by the Association of Cyber Forensics and Threat Investigators ( ) and is managed for the Association by the ACFTI Executive Committee. The Association reserves the right to remove subscribers and/or refuse subscription at any time without warning or explanation. The Association would very much prefer not to exercise this right and will not need to do so if subscribers comply with the list rules. In subscribing to CFATI, you are agreeing to adhere to these rules:

  • Diverse opinions are welcome. The readership of CFATI includes people from a wide variety of professional, disciplinary, methodological, and national traditions. List participants are expected to respect these differences. We ask that you maintain a tone of civility and use good judgment in your posts: disagreements are to be expected, but blatant rudeness, personal attacks, lack of respect, and monopolization of CFATI to further one's own agenda are not expected, nor will they be tolerated.

  • Anonymous subscriptions and posts are not allowed. In order to help maintain the list as a valuable resource for everyone, you must identify yourself by your real full name when you subscribe and when you post to CFATI, and you should be prepared to verify your identity upon the executive committee's request, including by providing a CV or résumé. This will normally occur upon subscription.

  • You must reply to private email privately, and you may not forward a personal email to CFATI without the author's permission. When responding to a CFATI post with a post to CFATI, please ensure you correctly quote only the previous post or thread.

  • ACFTI recognises that certain posts of a commercial nature - including but not limited to job advertisements, announcements of new publications, and promotions and discounts for research tools and services - may be of genuine interest to subscribers. Such posts are acceptable on the list if they are sent from time to time, at a low frequency. Repeated posts promoting the same or substantially similar products, services, or other offers will not be tolerated if they are sent more than once per month, and may lead to the removal of the post or the suspension of the subscriber.

  • Keep in mind that anything you send to CFATI automatically goes to all subscribers – please keep posts on-topic for the list. Also, remember when posting to the list that CFATI is a public forum and that your words will be available to everyone subscribed to the list and placed in a public archive. Messages sent via email can easily be reproduced and circulated beyond their originally intended audience, and neither the list manager, the Association's officers, nor the list server’s host are responsible for consequences arising from list messages being re-distributed.

DISCLAIMER; Unless otherwise indicated, opinions expressed in messages on CFATI are those of the authors and do not necessarily represent official ACFTI policy. ACFTI and its members bear no responsibility for the content of messages posted to CFATI. This is a unmoderated list.

Visit Us On Social Media:

Subscribe to our Facebook Group
Follow Us On Twitter
Like our Facebook Page

Copyright © Association of Cyber Forensics and Threat Investigators. All rights reserved.