Conference Information
ICSC''' 2025: Intelligent Cybersecurity Conference
https://www.icsc-conference.org/2025/Submission Date: |
2025-01-15 |
Notification Date: |
2025-04-01 |
Conference Date: |
2025-05-19 |
Location: |
Tampa, Florida, USA |
Years: |
5 |
Viewed: 1952 Tracked: 0 Attend: 0
Call For Papers
In today’s world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others. The Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to: Intelligent systems for effective detection of cyber-attacks Advanced Intelligent systems and data analytics for Cloud/Edge systems security Malware detection using intelligent systems Vulnerability assessment Intelligent systems for intrusion detection in Internet of Things (IoT) systems Network forensics using intelligent systems and data analytics Data Analytics for privacy-by-design in smart health Datasets, benchmarks, and open-source packages Recourse efficient deep learning Adversarial Machine learning and Backdoor Attacks Blockchain Systems for Cyber Security Trustworthy AI Systems Intelligent Systems for Misinformation Detection
Last updated by Dou Sun in 2024-11-12
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICDCIT | International Conference on Distributed Computing and Intelligent Technology | 2023-08-07 | 2024-01-17 |
IRESP | International Conference on Information Retrieval, Electronics and Signal Processing | 2024-02-20 | 2024-03-08 |
ICoIAS | International Conference on Intelligent Autonomous Systems | 2021-03-15 | 2021-05-14 |
FORTE | International Conference on Formal Techniques for Distributed Systems | 2024-02-02 | 2024-06-17 |
ICETIS | International Conference on Electronic Technology and Information Science | 2018-06-04 | 2018-06-08 |
ICICML | International Conference on Image Processing, Computer Vision and Machine Learning | 2024-10-21 | 2024-11-22 |
EC | ACM Conference on Economics and Computation | 2016-02-23 | 2016-07-24 |
TDPF | International Symposium on Technologies for Digital Photo Fulfillment | 2018-05-15 | 2018-09-24 |
DCC | Data Compression Conference | 2024-10-04 | 2025-03-18 |
Meche | International Conference on Mechanical Engineering | 2022-02-05 | 2022-02-19 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
IETE Technical Review | 2.500 | Taylor & Francis | 0256-4602 | |
International Journal of Critical Infrastructure Protection | 4.100 | Elsevier | 1874-5482 | |
Games and Culture | 2.400 | SAGE | 1555-4120 | |
Design Automation for Embedded Systems | 0.900 | Springer | 0929-5585 | |
Journal of Information Technology in Construction | Herman | 1400-6529 | ||
Constraints | 0.500 | Springer | 1383-7133 | |
Measurement | 5.200 | Elsevier | 0263-2241 | |
c | IEEE Transactions on Big Data | 7.500 | IEEE | 2332-7790 |
IEEE Transactions on Nanobioscience | 3.700 | IEEE | 1536-1241 | |
c | Personal and Ubiquitous Computing | Springer | 1617-4909 |
Full Name | Impact Factor | Publisher |
---|---|---|
IETE Technical Review | 2.500 | Taylor & Francis |
International Journal of Critical Infrastructure Protection | 4.100 | Elsevier |
Games and Culture | 2.400 | SAGE |
Design Automation for Embedded Systems | 0.900 | Springer |
Journal of Information Technology in Construction | Herman | |
Constraints | 0.500 | Springer |
Measurement | 5.200 | Elsevier |
IEEE Transactions on Big Data | 7.500 | IEEE |
IEEE Transactions on Nanobioscience | 3.700 | IEEE |
Personal and Ubiquitous Computing | Springer |
Recommendation