Call for Papers
The Cyber-AI 2025 Conference is the premier event uniting researchers, professionals, and innovators from academia and industry to explore cutting-edge advancements in cybersecurity and AI. This four-day conference, held in the picturesque coastal city of Varna, Bulgaria—often referred to as the "Sea Capital" for its location along the stunning Black Sea—will showcase groundbreaking research, practical solutions, and collaborative discussions on how AI is revolutionizing cybersecurity and how secure AI systems are being built to withstand evolving threats. Attendees will have the opportunity to engage with thought leaders, participate in interactive sessions, and network with global experts. From novel AI-driven threat detection systems to ethical challenges in AI governance, the event promises an in-depth look at the intersection of these transformative fields.
We are thrilled to invite researchers, industry professionals, and innovators to the Cyber-AI 2025 Conference, the foremost event at the nexus of cybersecurity and artificial intelligence.
- Innovations in AI Algorithm Development
- Intelligent Systems for Detecting Cyber-Attacks Effectively
- Advanced Intelligent Solutions and Data Analytics for Enhancing Cloud and Edge Security
- Malware Detection and Vulnerability Assessment Using Intelligent Systems
- Intelligent Intrusion Detection Systems for Internet of Things (IoT) Applications
- Network Forensics Leveraging Intelligent Systems and Data Analytics
- Data Analytics Approaches for Privacy-by-Design in Smart Healthcare Systems
- Datasets, Benchmarks, and Open-Source Tools for Cybersecurity Applications
- Efficient Deep Learning Techniques for Resource-Constrained Environments
- Adversarial Machine Learning and Mitigation of Backdoor Attacks
- Blockchain Technologies for Strengthening Cybersecurity Frameworks
- Developing Trustworthy and Reliable AI Systems
- Intelligent Approaches for Detecting and Mitigating Misinformation
- Sensors Attacks Detection and Mitigations
- Cybersecurity for IoT Public Health Devices
- Cybersecurity Management in IoT Devices
- Cybersecurity in IoT Cloud Interfaces
- Cybersecurity of Web Interface in the IoT Products
- Cybersecurity of IoT in Education
- Cybersecurity of Mobile Interface to IoT device
- Cybersecurity Infrastructure for IoT Solutions
- Cybersecurity Application for IoT networks
- Cybersecurity in Smart Homes and Smart cities
- Cybersecurity in Power, Solar Chimeneas, and Nucellar units
- Cybersecurity for Smart Vehicles and Transportation Domains
- Cybersecurity in Drones and Aviation systems
Submission Guidelines:
Paper format
Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates for Conference Proceedings.
- The needed IEEE Word, Latex, Overleaf template can be found her (IEEE Conference Templates).
Length
Submitted papers may be up to 8 pages. for references.
Originality
Papers submitted to Cyber-AI must be the original work of the authors. The may not be simultaneously under review elsewhere. Publications that have been peer-reviewed and have appeared at other conferences or workshops may not be submitted to anywhere else. Authors should be aware that IEEE has a strict policy with regard to plagiarism https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html The authors' prior work must be cited appropriately.
Proofreading:
Please proofread your submission carefully. It is essential that the language use in the paper is clear and correct so that it is easily understandable. (Either US English or UK English spelling conventions are acceptable.)
Author list
Please ensure that you submit your papers with the full and final list of authors in the correct order. The author list registered for each submission is not allowed to be changed in any way after the paper submission deadline.
IMPORTANT: No-Show Policy
At least one author of each accepted paper is required to register to the conference and present the paper.
Publication:
All papers that are accepted, registered, and presented in Cyber-AI and the workshops co-located with it will be submitted to IEEEXplore for publication.