April 29-30, 2025, ASTANA IT UNIVERSITY, ASTANA

1st International Conference on Cybersecurity, Digital Forensics, and AI Applications

Call for Papers

If you are interested to submit your research article or to attend on this Conference.

ICCSDFAI25 conference is expected to bring together researchers and practitioners from different fields of Cybersecurity, AI, and Digital Technology. The technical program will include technical sessions and events devoted to students and scientists, professionals from state organizations, entrepreneurs, and industries.

The technical sessions will be organized into six main tracks:


Session A1: Cybersecurity

This session explores the aspect of the modern digital landscape, ensuring the protection of systems, networks, and data from cyber threats. Topics included, but are not limited to:

  • Data Protection & Privacy
  • Ethical Hacking
  • Penetration Testing
  • Threat Hunting
  • Malware Analysis
  • Web Security
  • Incident Response and Cyber Crisis Management
  • Cloud Security
  • AI Application in Cybersecurity
  • Cybersecurity Regulations, Compliance and Governance
  • Secure Software Development & DevSecOps
  • Operating Systems Security
  • Reverse Engineering
  • Cryptography

Session A2: Digital Forensics

This session will focus on the latest advancements, methodologies, and challenges in digital forensic investigations. Topics may include. Topics included, but are not limited to:

  • Network Forensics
  • Mobile Forensics
  • Computer Forensics
  • Cloud Forensics
  • Privacy and Legal Challenges in Digital Forensics
  • AI and Machine Learning for Digital Forensic Investigations

Session A3: AI Applications for Data Security in Industry, Healthcare, and Business

This session explores how AI is being used to protect sensitive data across key sectors, ensuring privacy, compliance, and security in industry, healthcare, and business. Topics included, but are not limited to:

  • AI for Data Loss Prevention and Leakage Detection
  • Machine Learning for Fraud Detection in Finance and E-Commerce
  • AI-Driven Access Control and Authorization
  • Privacy-Preserving AI Applications
  • AI-Powered Threat Detection in Industrial Control Systems (ICS)
  • AI in Healthcare: Securing Medical Records and Patient Data
  • Blockchain and AI for Data Integrity and Secure Transactions
  • AI for Regulatory Compliance and Risk Management
  • Automated Threat Intelligence for Corporate Data Protection
  • Neural Networks for Anomaly Detection in Cloud Storage
  • AI-Powered Encryption and Secure Communication Systems
  • AI in Supply Chain Security: Protecting Intellectual Property and Logistics Data

Session B1: Internet of Things (IoT) and IoT Applications

This session focuses on IoT innovations, security challenges, and applications across various industries. Topics may include:

  • Industrial IoT (IIoT) for Predictive Maintenance and Automation
  • IoT in Healthcare Systems
  • Wearable IoT Connected Devices
  • IoT for Automation and Optimization
  • Energy-Efficient IoT and Sustainability in Smart Environments
  • IoT for Smart Agriculture and Precision Farming
  • IoT Security Threats and Countermeasures
  • Standardization and Regulation of IoT Security Frameworks
  • Cybersecurity Challenges in Vehicle-to-Everything (V2X) Communication
  • Secure Firmware and Software Updates for IoT Devices
  • Blockchain for Secure IoT Transactions and Data Sharing
  • Intelligent Systems and Smart Technology
  • Cyber-Physical Systems Security

Session B2: Telecommunications and Computer Networks Security

This session addresses advancements in digital telecommunications, computer networks and cybersecurity strategies for modern computing environments. Topics included, but are not limited to:

  • Next-Generation Networking Technologies (5G, 6G, SDN, NFV) Security
  • Secure Cloud Computing and Virtualization Security
  • Cybersecurity in Computer Network Infrastructure
  • Threat Intelligence and Intrusion Detection in Modern Networks
  • Wireless Network Security and Emerging Protocols
  • Cybersecurity in Satellite and Space Communication Networks
  • AI-Driven Network Monitoring and Anomaly Detection

Session B3: Sustainable Smart Cities: Renewable Energy, Power Systems, and Grid Automation

  • Renewable Energy Integration
  • Smart Grids & Power Management
  • Energy-Efficient Infrastructure
  • Power Systems Automation
  • Electric Vehicles and Charging Infrastructure
  • Sustainable Energy Policies
  • Cybersecurity in Power Systems
  • Smart Transportation and Mobility
  • Embedded Systems in Smart Cities
  • Mechanical Systems in Urban Planning
  • Resilient Urban Power Systems
  • Cyber-Physical Systems for Smart Cities
  • Sustainable Mechanical Engineering for Smart Cities
Invitation letters

Dear participants,


Below you can find invitation letters for participants

Dear speakers,


Below you can find invitation letters for speakers

Template

The authors should submit a paper of 4-6 pages (in English only) using 2025 IEEE SIST link to Microsoft Conference Management Tool. It should define the scope of the work, emphasizing new advances, theories, and/or applications, and include an analysis of results and findings. The paper must be structured such that the program committee will be able to understand the originality and the value of the work.

Requirements for the submitted paper:

1. Use a minimum of 10 references per paper

2. Maximum of 20% of self-citation

3. Minimum 30% of references from Scopus and Web of Science

4. Maximum 6 authors per paper

5. One author can submit up to 3 papers

Please see the attached file with detailed information on the paper formatting.

KEY DATES

Deadline for Full Paper Submission:

15 March 2025
Acceptance Notification:

30 March 2025

Camera Ready Submission:

15 April 2025

Deadline for Authors’ Registration:
15 April 2025
Conference Dates:

29-30 April 2025

REGISTRATION FEES

Note: If an article is accepted and recommended for publication in indexed journals, an additional fee may be charged.
All Category
No fee (KZT/USD)
submission

Once Paper meets all the requirements indicated above, we request authors to submit a file paper by clicking on Submit Your Paper. There you need to click on "make a new submission" and follow instructions.

Made on
Tilda