<div dir="ltr"><div dir="ltr"><div dir="ltr">
<div dir="ltr"><div dir="ltr">
<div dir="ltr"><div dir="ltr">
<div dir="ltr"><div dir="ltr">
<div dir="ltr">
<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>[Apologies if you got multiple copies of this
invitation]<span></span></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-family:"Calibri",sans-serif"><font size="6"><span style="line-height:106%">The Fifth Intelligent Cybersecurity Conference
(ICSC2025)</span></font></p><p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-family:"Calibri",sans-serif"><font size="4" style="color:rgb(255,0,0)">Hybrid Event</font></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-family:"Calibri",sans-serif"><font size="4"><a href="https://www.icsc-conference.org/2025/" target="_blank">https://www.icsc-conference.org/2025/</a></font></p><p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-family:"Calibri",sans-serif"><font size="4"></font></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif">
</p><p align="center" style="margin-bottom:8pt;text-align:center;background:white">
<span style="font-size:13.5pt;color:black">Tampa, Florida, USA. May 19-22, 2025</span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif">
</p><p align="center" style="margin-bottom:8pt;text-align:center;background:white">
<span style="font-size:13.5pt;color:red">Technically Co-Sponsored by IEEE Florida West Coast Section</span><u></u><u></u></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:14pt;font-family:"Times New Roman",serif">ICSC 2025
CFP:</span></u></b><span><span></span></span></p>
<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">In
today’s world, connected systems, social networks, and mobile communications
create a massive flow of data, which is prone to cyberattacks. This needs fast
and accurate detection of cyber-attacks. Intelligent systems and Data analytics
are important components when issues pertaining to effective security solutions
become the subject of discussion. This is because there is an impending need
for high volume and high velocity data from different sources to detect
anomalies as soon as they are discovered. This will help reduce significantly
the vulnerability of the systems as well as improve their resilience to cyber
Attacks. The capability to process large volumes of information at real time
through utilization of tools for data analytics has many advantages vital for
analysis of cybersecurity systems. Moreover, the data collected from
sophisticated intelligent systems, cloud systems, networks, sensors, computers,
intrusion detection systems could be used to identify vital information. This
information could be used to detect how vulnerable the systems are to risk
factors, and so effective cyber security solutions can be developed. In
addition to that, the utilization of data analytics tools in the cybersecurity
field gives new insights through considering factors such as zero-day attack
detection, real time analysis, resource constrained data processing among
others. <span></span></span></p>
<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">The
Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced
intelligent systems in providing cybersecurity solutions in many fields, and
the challenges, approaches, and future directions. We invite the submission of
original papers on all topics related to Intelligent Systems for Cybersecurity,
with special interest in but not limited to: <span></span></span></p>
<ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Intelligent systems for effective detection of
cyber-attacks<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Advanced Intelligent systems and data analytics for
Cloud/Edge systems security<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Malware detection using intelligent systems
Vulnerability assessment<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Intelligent systems for intrusion detection in Internet
of Things (IoT) systems<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Network forensics using intelligent systems and data
analytics<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Data Analytics for privacy-by-design in smart health<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Datasets, benchmarks, and open-source packages<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Recourse efficient deep learning<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Adversarial Machine learning and Backdoor Attacks<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Blockchain Systems for Cyber Security<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Trustworthy AI Systems<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Intelligent Systems for Misinformation Detection<span></span></span></li></ul>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Times New Roman",serif"> </span><b><u><span style="font-size:12pt;font-family:"Times New Roman",serif">Submissions Guidelines and Proceedings</span></u></b><span><span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><span>Manuscripts should
be prepared in 10-point font using the IEEE 8.5" x 11" two-column
format. All papers should be in PDF format, and submitted electronically at
Paper Submission Link. A full paper can be up to 8 pages (including all
figures, tables and references). Submitted papers must present original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines may be rejected
without review. Also submissions received after the due date, exceeding length
limit, or not appropriately structured may also not be considered. Authors may
contact the Program Chair for further information or clarification. All
submissions are peer-reviewed by at least three reviewers. Accepted papers will
appear in the ICSC Proceeding, and be published by the IEEE Computer Society
Conference Publishing Services and be submitted to IEEE Xplore for inclusion. <br>
<br>
Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular papers
up to 8 pages and must follow the IEEE paper format. Please include up to 7
keywords, complete postal and email address, and fax and phone numbers of the
corresponding author. Authors of accepted papers are expected to present their
work at the conference. Submitted papers that are deemed of good quality but
that could not be accepted as regular papers will be accepted as short papers.
Length of short papers can be up to 6 pages. <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:13.5pt;line-height:106%;color:black"></span></u><u><span style="font-size:13.5pt;line-height:106%;font-family:"Calibri Light",sans-serif;color:black">Important
Dates:</span></u><span style="font-family:"Calibri Light",sans-serif"><span></span></span></p>
<ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Calibri Light",sans-serif;color:rgb(255,0,0)"></span><span style="font-size:14pt;font-family:"Calibri Light",sans-serif"><span style="color:rgb(255,0,0)">Paper
submission deadline: Jan 15th 2025</span><span></span></span></b></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Notification
of acceptance: April 1st, 2025 <span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Camera-ready
Submission: April 21st, 2025<span></span></span></li></ul>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Calibri Light",sans-serif"><span> </span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:12pt;line-height:106%;font-family:"Calibri Light",sans-serif">Contact:</span></u></b></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:12pt;line-height:106%;font-family:"Calibri Light",sans-serif"><br></span></u></b><span style="font-family:"Calibri Light",sans-serif"><span></span></span></p>
<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><font size="4">Please send any inquiry on ICSC to Fahed Alkhabbas at: <a href="mailto:fahed.alkhabbas@mau.se" target="_blank">fahed.alkhabbas@mau.se</a> </font><span style="font-size:12pt;line-height:106%;font-family:"Calibri Light",sans-serif"><span></span></span></p>
<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="color:black"></span><span><span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>