CYBER 2025 - The Tenth International Conference on Cyber-Technologies and Cyber-Systems
September 28, 2025 - October 02, 2025
CYBER 2025
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
ISSN: 2519-8599
ISBN: 978-1-68558-295-1
CYBER 2025 is colocated with the following events as part of NexTech 2025 Congress:
- UBICOMM 2025, The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
- ADVCOMP 2025, The Nineteenth International Conference on Advanced Engineering Computing and Applications in Sciences
- SEMAPRO 2025, The Nineteenth International Conference on Advances in Semantic Processing
- AMBIENT 2025, The Fifteenth International Conference on Ambient Computing, Applications, Services and Technologies
- EMERGING 2025, The Seventeenth International Conference on Emerging Networks and Systems Intelligence
- DATA ANALYTICS 2025, The Fourteenth International Conference on Data Analytics
- GLOBAL HEALTH 2025, The Fourteenth International Conference on Global Health Challenges
- CYBER 2025, The Tenth International Conference on Cyber-Technologies and Cyber-Systems
CYBER 2025 General Chair
|
|
Steve Chan
Decision Engineering Analysis Laboratory
USA
|
|
|
|
CYBER 2025 Steering Committee
|
|
Carla Merkle Westphall
UFSC
Brazil
|
|
|
Barbara Re
University of Camerino
Italy
|
|
|
Rainer Falk
Siemens AG, Corporate Technology
Germany
|
|
|
Daniel Kästner
AbsInt GmbH
Germany
|
|
|
Anne Coull
Flinders University, Adelaide
Australia
|
|
|
Steffen Fries
Siemens
Germany
|
|
|
Sibylle Fröschle
TU Hamburg
Germany
|
|
|
Andreas Aßmuth
Fachhochschule Kiel
Germany
|
CYBER 2025 conference tracks:
Trends in Cybersecurity
Blockchain and machine learning for cybersecurity; Behavioral biometrics authentication; Privacy by design; Anonymity of blockchain and cryptocurrencies; Threat categorization and threat detection; Threats on critical national infrastructures; Gift card hacking techniques; Medical IoT Device-to-Device communication; Blockchain in supporting critical infrastructures; Vulnerability on social media spaces; Internet of Medical Things (IOMT); Cybersecurity for digital vehicles; Potential radicalization on social media; Blockchain and healthcare systems; Risk-based human behavior profiling; Forensic recovery of cloud evidence; Hacking pacemakers; Prediction of cyber attacks; Ransomware cyberweapon; Liability attribution in smart workplaces; Cybersecurity, laws and regulations; Information from browsers by online advertising platforms; Predicting social engineering victims; Cybercrime awareness
Cyber Resilience
Cyber security assessment; Data analytics for Cyber resilience; Organizational security (government, commercial); Resilient smart cities; Resilient Internet of Things (RIOT); Cyber-cities and Cyber-environments; Critical infrastructure security; Back up and recovery for systems of systems; Disaster planning and management from Cyber perspective; Integrated and smarter sensors
Resiliency and risks
Resiliency in smart cities; Reliability and resiliency in wireless networks; Detecting anomalous activity; Resources constrained systems/devices; Disruption-tolerant systems; Resiliency and access in restricted areas; Monitoring maritime critical disasters; Critical supply networks; Risk assessment
Technologies for resiliency
Self-organized disaster management systems; Technological catastrophes and crises management; Deep-learning & Big Data and disaster recovery; Disaster management in 5G uRLLC-based systems; 5G and IoT in disaster management; Aerial Systems for Disaster Management; IoT sensing platforms for public safety
Cyber Security
Security management [overall information security management in the sense of 27000 series applied to cyber systems]; Compliance management [verify/check compliance with defined policies, provide corresponding management reports]; Security administration of cyber systems [technical security management of security services]; Security and privacy regulations and laws; Securely interconnected cyber systems [firewalls, cross-domain security solutions]; Self-securing and self-defending cyber systems; Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way]; Security technologies for protecting cyber systems and devices; Identity and access management in cyber systems; Anti-counterfeiting; Secure production and supply chain; Cloud computing security; Big-data security; Advanced persistent threats; Network traffic analysis and trace-back; Cyberspace operations; Incident response, investigation, and evidence handling; Intrusion detection and prevention; Cyberspace protection and anti-malware; Cooperation and sharing for Cyber-defense
Cyber Infrastructure
Cyber-Cities and Cyber-environments; Information technology infrastructure; Telecommunications and networks; Cyber-space and data centers; Cyber-enabled control systems; Cyber-enabled critical infrastructure systems; Cyber-physical systems and Internet of Things; Special application domains (smart grid, traffic management systems, autonomous driving, etc.); Embedded processors and controllers; Mobility in Cyber-space; Virtualization in Cyber-space
Cyber Forensics
Computer and networks forensics; Social networking forensics; Digital forensics tools and applications; Applications of information hiding; Identification, authentication, and collection of digital evidence; Anti-forensic techniques and methods; Watermarking and intellectual property theft; Privacy issues in network forensics; Tools, applications, case studies, best practices
Cyber Crime
Cyber-crimes: Challenges in detection/prevention; Anomalies detection; Advanced Persistent Threats and Cyber-resilience; BotNets and MobiNets; Cyber crime-related investigations; Challenges and detection of Cyber-crimes; Network traffic analysis, traceback; Security information and event management (SIEM); Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.
Nature-inspired and Bio-inspired Cyber-defense
Bio-inspired anomaly & intrusion detection; Autonomic and Adaptive Cyber-Defense; Adaptive and Evolvable Systems; Cooperative defense systems; Network artificial immune systems; Adaptation algorithms for cyber security; Biometrics related to cyber defense; Bio-inspired security and networking algorithms and technologies; Biomimetics related to cyber security; Bio-inspired cyber threat intelligence methods and systems; Bio-inspired algorithms for dependable networks; Correlations in moving-target techniques; Neural networks, evolutionary algorithms, and genetic algorithms for cyber security Prediction techniques for cyber defense; Information hiding solutions (steganography, watermarking) and detection
Social-inspired opportunistic mobile Cyber-systems
Design of cyber-physical applications for opportunistic mobile systems based on behavioral models; Social metrics for networks and systems operations; Application of mixed physical and online social network sensing; Social-aware modeling, design and development of routing algorithms in cyber-physical; Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems; Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems; Experiments with cyber-physical opportunistic mobile systems
Deadlines:
Submission | Jun 10, 2025 |
Notification | Jul 27, 2025 |
Registration | Aug 10, 2025 |
Camera ready | Aug 24, 2025 |
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).