![]() |
| |||||||||||||||
Cyber-AI 2025 : The International Conference on Cybersecurity and AI-Based Systems (IEEE @ Scopus) | |||||||||||||||
Link: https://cyber-ai.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Cyber-AI 2025 Conference (IEEE @ Scopus) is the premier event uniting researchers, professionals, and innovators from academia and industry to explore cutting-edge advancements in cybersecurity and AI. This four-day conference, held in the picturesque coastal city of Varna, Bulgaria—often referred to as the "Sea Capital" for its location along the stunning Black Sea—will showcase groundbreaking research, practical solutions, and collaborative discussions on how AI is revolutionizing cybersecurity and how secure AI systems are being built to withstand evolving threats. Attendees will have the opportunity to engage with thought leaders, participate in interactive sessions, and network with global experts. From novel AI-driven threat detection systems to ethical challenges in AI governance, the event promises an in-depth look at the intersection of these transformative fields.
We are thrilled to invite researchers, industry professionals, and innovators to the Cyber-AI 2025 Conference, the foremost event at the nexus of cybersecurity and artificial intelligence. Don't miss this unparalleled opportunity to shape the future of secure, intelligent systems with special interest in but not limited to: AI, Machine Learning, Deep Learning, Federated Learning and Creativity Innovations in AI Algorithm Development Natural Language Processing (LNP) Augmented Reality (AR), Virtual Reality (VR), and Extended reality (XR) Developing Trustworthy and Reliable AI Systems Intelligent Intrusion Detection Systems for Internet of Things (IoT) Applications Network Forensics Leveraging Intelligent Systems and Data Analytics Data Analytics Approaches for Privacy-by-Design in Smart Healthcare Systems Datasets, Benchmarks, and Open-Source Tools for Cybersecurity Applications Efficient Deep Learning Techniques for Resource-Constrained Environments Adversarial Machine Learning and Mitigation of Backdoor Attacks Blockchain Technologies for Strengthening Cybersecurity Frameworks Advanced Intelligent Solutions and Data Analytics for Enhancing Cloud and Edge Security Malware Detection and Vulnerability Assessment Using Intelligent Systems Intelligent Approaches for Detecting and Mitigating Misinformation Intelligent Systems for Detecting Cyber-Attacks Effectively Sensors Attacks Detection and Mitigations Cybersecurity for IoT Public Health Devices Cybersecurity Management in IoT Devices Cybersecurity in IoT Cloud Interfaces Cybersecurity of Web Interface in the IoT Products Cybersecurity of IoT in Education Cybersecurity of Mobile Interface to IoT device Cybersecurity Infrastructure for IoT Solutions Cybersecurity Application for IoT networks Cybersecurity in Smart Homes and Smart cities Cybersecurity in Power, Solar Chimeneas, and Nucellar units Cybersecurity for Smart Vehicles and Transportation Domains Cybersecurity in Drones and Aviation systems |
|