ICCSDFAI-2025: International Conference on Cybersecurity, Digital Forensics, and AI Applications Astana IT University Astana, Kazakhstan, April 29-30, 2025 |
Conference website | http://iccsdfai.org |
Submission link | https://easychair.org/conferences/?conf=iccsdfai2025 |
If you are interested to submit your research article or to attend on this Conference.
ICCSDFAI25 conference is expected to bring together researchers and practitioners from different fields of Cybersecurity, AI, and Digital Technology. The technical program will include technical sessions and events devoted to students and scientists, professionals from state organizations, entrepreneurs, and industries.
The technical sessions will be organized into six main tracks:
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers describing
The authors should submit a paper of 4-6 pages (in English only) using 2025 IEEE SIST link to Microsoft Conference Management Tool. It should define the scope of the work, emphasizing new advances, theories, and/or applications, and include an analysis of results and findings. The paper must be structured such that the program committee will be able to understand the originality and the value of the work.
Requirements for the submitted paper:
1. Use a minimum of 10 references per paper
2. Maximum of 20% of self-citation
3. Minimum 30% of references from Scopus and Web of Science
4. Maximum 6 authors per paper
5. One author can submit up to 3 papers
Please see the attached file with detailed information on the paper formatting.
- Posters N/A
List of Topics
Session A1: Cybersecurity
This session explores the aspect of the modern digital landscape, ensuring the protection of systems, networks, and data from cyber threats. Topics included, but are not limited to:
- Data Protection & Privacy
- Ethical Hacking
- Penetration Testing
- Threat Hunting
- Malware Analysis
- Web Security
- Incident Response and Cyber Crisis Management
- Cloud Security
- AI Application in Cybersecurity
- Cybersecurity Regulations, Compliance and Governance
- Secure Software Development & DevSecOps
- Operating Systems Security
- Reverse Engineering
Session A2: Digital Forensics
This session will focus on the latest advancements, methodologies, and challenges in digital forensic investigations. Topics may include. Topics included, but are not limited to:
- Network Forensics
- Mobile Forensics
- Watch Forensics
- Computer Forensics
- Cloud Forensics
- Cryptography
- Privacy and Legal Challenges in Digital Forensics
- AI and Machine Learning for Digital Forensic Investigations
Session A3: AI Applications for Data Security in Industry, Healthcare, and Business
This session explores how AI is being used to protect sensitive data across key sectors, ensuring privacy, compliance, and security in industry, healthcare, and business. Topics included, but are not limited to:
- AI for Data Loss Prevention and Leakage Detection
- Machine Learning for Fraud Detection in Finance and E-Commerce
- AI-Driven Access Control and Authorization
- Privacy-Preserving AI Applications
- AI-Powered Threat Detection in Industrial Control Systems (ICS)
- AI in Healthcare: Securing Medical Records and Patient Data
- Blockchain and AI for Data Integrity and Secure Transactions
- AI for Regulatory Compliance and Risk Management
- Automated Threat Intelligence for Corporate Data Protection
- Neural Networks for Anomaly Detection in Cloud Storage
- AI-Powered Encryption and Secure Communication Systems
- AI in Supply Chain Security: Protecting Intellectual Property and Logistics Data
Session B1: Internet of Things (IoT) and IoT Applications
This session focuses on IoT innovations, security challenges, and applications across various industries. Topics may include:
- Industrial IoT (IIoT) for Predictive Maintenance and Automation
- IoT in Healthcare Systems
- Wearable IoT Connected Devices
- IoT for Automation and Optimization
- Energy-Efficient IoT and Sustainability in Smart Environments
- IoT for Smart Agriculture and Precision Farming
- IoT Security Threats and Countermeasures
- Standardization and Regulation of IoT Security Frameworks
- Cybersecurity Challenges in Vehicle-to-Everything (V2X) Communication
- Secure Firmware and Software Updates for IoT Devices
- Blockchain for Secure IoT Transactions and Data Sharing
- Intelligent Systems and Smart Technology
- Cyber-Physical Systems Security
Session B2: Telecommunications and Computer Networks Security
This session addresses advancements in digital telecommunications, computer networks and cybersecurity strategies for modern computing environments. Topics included, but are not limited to:
- Next-Generation Networking Technologies (5G, 6G, SDN, NFV) Security
- Secure Cloud Computing and Virtualization Security
- Cybersecurity in Computer Network Infrastructure
- Threat Intelligence and Intrusion Detection in Modern Networks
- Wireless Network Security and Emerging Protocols
- Cybersecurity in Satellite and Space Communication Networks
- AI-Driven Network Monitoring and Anomaly Detection
Committees
Program Committee
- Person 1 AA
- Person 2 BB
- Person 3 CC
Organizing committee
- Person 1 Dr. L.Rzayeva
- Person 2 Dr. G. Abitova
- Person 3 A. Batkuldin
Invited Speakers
- Speaker 1 AA
- Speaker 2 BB
- Speaker 3 CC
Publication
ICCSDFAI-2025 proceedings will be published in Scientific Journal Astana IT University
Venue
The conference will be held in Astana IT University, Astana Kazakhstan
Contact
All questions about submissions should be emailed to info@iccsdfai.org