11–12 September 2026  |  UPES Dehradun, Uttarakhand  | 
Sponsored by IEEE UP Section Conference Record #70668 conference_socs@ddn.upes.ac.in
ICACSDF 2026
UPES Logo IEEE UP Section Logo

Sponsored by IEEE UP Section Conference Record #70668
School of Computer Science, UPES Dehradun, India

International Conference on Advances in Cyber Security and Digital Forensics

This crucial event brings together cybersecurity experts, digital forensics researchers, and information security professionals to tackle evolving cyber threats and digital crimes.

Sponsored by IEEE UP Section Conference Record #70668
Countdown to ICACSDF 2026
Conference starts: 11 September 2026
--
Days
--
Hours
--
Minutes
--
Seconds
Tip: Update deadlines early so authors don’t miss submission dates. The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
Conference Dates
11–12 September 2026
Venue
UPES Dehradun, Uttarakhand
Sponsorship
Sponsored by IEEE UP Section Conference Record #70668

About the Conference

School of Computer Science, UPES Dehradun, is organizing the International Conference on Advances in Cyber Security and Digital Forensics (ICACSDF 2026). Sponsored by the IEEE UP Section, this crucial event brings together cybersecurity experts, digital forensics researchers, and information security professionals to tackle evolving cyber threats and digital crimes. The conference is a vibrant platform for exploring emerging trends, fostering interdisciplinary dialogue, and shaping the future of cybersecurity and digital forensics. Attendees will participate in discussions, share insights, and collaborate on the latest advancements in cybersecurity strategies, threat mitigation, and digital forensic techniques.

ICACSDF 2026 Timeline

Important Dates

Please note the key deadlines for paper submission, registration, and conference participation.

Paper Submission Opens

18 March 2026

Submission Deadline

30 June 2026

Notification of Acceptance

25 July 2026

Camera Ready Submission

15 August 2026

Last Date of Registration

25 August 2026

Conference Dates

11–12 September 2026
UPES Dehradun, Uttarakhand

Conference Highlights

  • IEEE Sponsored International Conference with SCOPUS-indexed publication in IEEE Xplore.
  • Securing the Digital Future through Innovation for Cyber Resilience towards a Safer, Connected World.
  • Global platform for Cybersecurity & Digital Forensics experts.
  • Showcase innovation and research for students and professionals.
  • Best Paper Awards & Participation Certificates for all participants.
  • Expert focus on emerging cyber threats & advanced security solutions.
  • Strong industry–academia collaboration opportunities.
  • Foster interdisciplinary research & knowledge exchange.

Objectives

  • Share knowledge, research findings, and innovative ideas, products, and services.
  • Foster collaboration, partnerships, joint projects, and business opportunities.
  • Discuss and address specific challenges or issues within the cybersecurity industry.
  • Engage with regulatory bodies and policymakers to address regulatory challenges.
  • Explore the impact of emerging technologies on cybersecurity.
  • Provide opportunities for skills development and training.
  • Raise awareness about the importance of cybersecurity.
  • Encourage sharing of threat intelligence and information on latest cyber threats.
  • Promote research and development in cybersecurity.
  • Discuss and promote industry standards, frameworks, and best practices.
  • Provide insights into effective incident response and crisis management strategies.

Conference Themes

Core tracks reflecting today’s cybersecurity and digital forensics landscape.

Advancements in Cryptography
  • Anonymity and authentication
  • Applied cryptography in the cloud
  • Cryptanalysis and attacks
  • Cryptographic implementation and testing
  • Digital signatures and secure voting
  • Identity and privacy confidentiality
  • Identity-based cryptography
  • Key distribution and management
  • Trust management
AI & ML in Cybersecurity
  • Adversarial behavior modeling
  • Cyber vulnerability prioritization and remediation
  • Deep learning / reinforcement learning
  • Interpretable and robust cyber-systems
  • Network intrusion detection and mitigation
Blockchain Technology
  • Blockchain vulnerabilities and threats
  • Consensus mechanisms and security
  • Fraud detection and financial crime prevention
  • Identity management and blockchain security
  • Incident response in blockchain
  • Privacy solutions in blockchain
  • Securing smart contracts
Cloud Computing Security
  • Cloud IAM and identity access management
  • Cloud security compliance and isolation
  • Threat detection, monitoring, and DLP
  • Securing cloud APIs
  • Zero Trust architecture
Cyber Threat Intelligence
  • AI/ML-based cyber threat analysis
  • CTI sharing and interoperability
  • Dark Web intelligence
  • Deception technologies
  • Dynamic risk management
  • Threat hunting
  • Threat modeling
Database & System Security
  • Database activity monitoring
  • Database encryption and access control
  • OS hardening and patch management
  • SQL injection prevention
Digital Forensics
  • Big data forensics
  • Digital evidence law and policy
  • ML in evidence extraction
  • Malware analysis and attribution
  • Network, cloud, and mobile forensics
Information Hiding & Watermarking
  • Digital watermarking
  • Reversible data hiding
  • Steganography and steganalysis
  • Cloud watermarking
IoT Security
  • IoT authentication
  • Device and firmware security
  • IoT standards
  • Critical infrastructure protection
Malware Analysis & Detection
  • APT detection
  • Behavioral analysis
  • Ransomware analysis
  • Static vs dynamic analysis
Privacy & Information Security
  • Authentication and authorization
  • Encryption and access control
  • Firewall technologies
  • Network protocols
  • Cyber-terrorism and intrusion detection
Quantum Cryptography
  • Device-independent cryptography
  • Quantum cryptanalysis
  • Quantum hacking
  • Quantum Internet
  • QKD
  • Secure quantum computing
Security Policies & Assurance
  • Continuous monitoring frameworks
  • Governance and policies
  • Incident response effectiveness
  • Risk and compliance auditing
Security Protocols
  • Cryptographic communication protocols
  • IoT and wireless protocols
  • TLS, IPSec, key exchange
  • Zero Trust protocols
Security Testing & Auditing
  • Automated testing tools
  • Penetration testing
  • Post-breach auditing
  • Red vs Blue Team
Software Security
  • Secure coding
  • DevSecOps
  • Application security testing
  • Supply chain security
Web Security
  • API security
  • Session management
  • XSS & SQL injection prevention
  • HTTPS/TLS, CSP, CSRF