Conference Information
ICSC''' 2025: Intelligent Cybersecurity Conference
https://www.icsc-conference.org/2025/
Submission Date:
2025-01-15
Notification Date:
2025-04-01
Conference Date:
2025-05-19
Location:
Tampa, Florida, USA
Years:
5
Viewed: 1955   Tracked: 0   Attend: 0

Call For Papers
 In today’s world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others.

The Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:

    Intelligent systems for effective detection of cyber-attacks
    Advanced Intelligent systems and data analytics for Cloud/Edge systems security
    Malware detection using intelligent systems Vulnerability assessment
    Intelligent systems for intrusion detection in Internet of Things (IoT) systems
    Network forensics using intelligent systems and data analytics
    Data Analytics for privacy-by-design in smart health
    Datasets, benchmarks, and open-source packages
    Recourse efficient deep learning
    Adversarial Machine learning and Backdoor Attacks
    Blockchain Systems for Cyber Security
    Trustworthy AI Systems
    Intelligent Systems for Misinformation Detection
Last updated by Dou Sun in 2024-11-12
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICDCITInternational Conference on Distributed Computing and Intelligent Technology2023-08-072023-10-092024-01-17
IRESPInternational Conference on Information Retrieval, Electronics and Signal Processing2024-02-202024-02-252024-03-08
ICoIASInternational Conference on Intelligent Autonomous Systems2021-03-152021-04-102021-05-14
cbb1FORTEInternational Conference on Formal Techniques for Distributed Systems2024-02-022024-03-292024-06-17
ICETISInternational Conference on Electronic Technology and Information Science2018-06-04 2018-06-08
ICICMLInternational Conference on Image Processing, Computer Vision and Machine Learning2024-10-21 2024-11-22
a*a1ECACM Conference on Economics and Computation2016-02-232016-05-102016-07-24
TDPFInternational Symposium on Technologies for Digital Photo Fulfillment2018-05-15 2018-09-24
ba*a2DCCData Compression Conference2024-10-042024-11-242025-03-18
MecheInternational Conference on Mechanical Engineering2022-02-052022-02-152022-02-19
Related Journals
CCFFull NameImpact FactorPublisherISSN
IETE Technical Review2.500Taylor & Francis0256-4602
International Journal of Critical Infrastructure Protection4.100Elsevier1874-5482
Games and Culture2.400SAGE1555-4120
Design Automation for Embedded Systems0.900Springer0929-5585
Journal of Information Technology in ConstructionHerman1400-6529
Constraints0.500Springer1383-7133
Measurement5.200Elsevier0263-2241
cIEEE Transactions on Big Data7.500IEEE2332-7790
IEEE Transactions on Nanobioscience3.700IEEE1536-1241
cPersonal and Ubiquitous ComputingSpringer1617-4909
Recommendation