https://www.icsc-conference.org/2023/index.php
23–25 October, 2023 | San Antonio, USA.
*Call for Papers*
In today's world, connected systems, social networks, and mobile
communications create a massive flow of data, which is prone to
cyberattacks. This needs fast and accurate detection of cyber-attacks.
Intelligent systems and Data analytics are important components when issues
pertaining to effective security solutions become the subject of
discussion. This is because there is an impending need for high volume and
high velocity data from different sources to detect anomalies as soon as
they are discovered. This will help reduce significantly the vulnerability
of the systems as well as improve their resilience to cyber Attacks. The
capability to process large volumes of information at real time through
utilization of tools for data analytics has many advantages vital for
analysis of cybersecurity systems. Moreover, the data collected from
sophisticated intelligent systems, cloud systems, networks, sensors,
computers, intrusion detection systems could be used to identify vital
information. This information could be used to detect how vulnerable the
systems are to risk factors, and so effective cyber security solutions can
be developed. In addition to that, the utilization of data analytics tools
in the cybersecurity field gives new insights through considering factors
such as zero-day attack detection, real time analysis, resource constrained
data processing among others.
The Intelligent Cybersecurity Conference (ICSC2023) addresses the use of
advanced intelligent systems in providing cybersecurity solutions in many
fields, and the challenges, approaches, and future directions. We invite
the submission of original papers on all topics related to Intelligent
Systems for Cybersecurity, with special interest in but not limited to:
- Intelligent systems for effective detection of cyber-attacks
- Advanced Intelligent systems and data analytics for Cloud/Edge systems
security
- Malware detection using intelligent systems Vulnerability assessment
- Intelligent systems for intrusion detection in Internet of Things
(IoT) systems
- Network forensics using intelligent systems and data analytics
- Data Analytics for privacy-by-design in smart health
- Datasets, benchmarks, and open-source packages
- Recourse efficient deep learning
- Adversarial Machine learning and Backdoor Attacks
- Blockchain Systems for Cyber Security
- Trustworthy AI Systems
- Intelligent Systems for Misinformation Detection
*Submission Guidelines:*
Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates
for Conference Proceedings
<https://www.ieee.org/conferences/publishing/templates.html>. Please
remember to add Keywords to your submission. Submitted papers may be up to
8 pages with two additional pages may be added for references.
Papers submitted to ICSC must be the original work of the authors. The may
not be simultaneously under review elsewhere. Publications that have been
peer-reviewed and have appeared at other conferences or workshops may not
be submitted to IDSTA. Authors should be aware that IEEE has a strict
policy with regard to plagiarism
https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html The
authors' prior work must be cited appropriately.
Please proofread your submission carefully. It is essential that the
language use in the paper is clear and correct so that it is easily
understandable. (Either US English or UK English spelling conventions are
acceptable.) All papers that are accepted, registered, and presented in
ICSC2023 and the workshops co-located with it will be submitted to
IEEEXplore for publication.
*Important Dates*
- Paper submission deadline: *25 August-2023 *
- Notification of acceptance: 20-September -2023
- Camera-ready Submission: 2-October-2023
For any inquiries, please contact: intelligenttechorg@gmail.com.
Best regards, ICSC organizing committee
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************