<div dir="ltr"><p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">[Apologies
if you got multiple copies of this invitation]</p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:24pt;line-height:105%">Call for Papers!</span><span style="font-size:12pt;line-height:105%"></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><b><span style="font-size:13.5pt;line-height:105%">The International Workshop on Large
Language Models for Cybersecurity (LLMCS 2024)-The 2nd International Conference
on Foundation and Large Language Models (FLLM2024) </span></b><span style="font-family:"Times New Roman",serif"></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="text-decoration-line:underline"><span class="gmail-msohyperlink"><span style="font-size:14pt;line-height:105%;color:rgb(5,99,193)"><a href="https://fllm2024.fllm-conference.org/Workshops/LLMCS2024/" style="color:rgb(5,99,193)">https://fllm2024.fllm-conference.org/Workshops/LLMCS2024/</a></span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;line-height:105%;color:black">26-29
November, 2024 | Dubai, UAE </span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:16pt;line-height:105%;color:red">Technically
Co-Sponsored by IEEE </span><span style="font-size:14pt;line-height:105%"> </span><span style="font-size:16pt;line-height:105%;color:red">UAE
Section </span></p>

<p class="MsoNormal" style="margin:0in 0in 7.5pt;text-align:justify;line-height:16.2pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif">Recent advancements in Generative Artificial
Intelligence have revolutionized the landscape of content creation and have
significantly changed how content is conceptualized, developed, and delivered
across various industries. Large Language Models (LLMs), such as BERT, T5,
ChatGPT, GPT-4, Falcon 180B, and Codex, have influenced most disciplines of
science and technology that support content generation in diverse applications,
including cybersecurity. In cybersecurity, LLMs represent a dual-purpose tool.
On the one hand, they empower malicious actors to identify vulnerabilities and
enhance attack strategies. Conversely, they empower security teams to fortify
defenses, identify threats, and effectively streamline risk management and
operational processes. Despite the anticipated widespread adoption of these
LLMs, our understanding of their full impact on cybersecurity still needs to be
completed. There is a critical need to assess how they contribute to the
discovery of vulnerabilities comprehensively, the development of new attack
tactics and techniques, the creation of complex malware patterns, the
identification of potential threats, and the mitigation of risks through
automated vulnerability remediation</p>

<p class="MsoNormal" style="margin:0in 0in 7.5pt;text-align:justify;line-height:16.2pt;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif">We invite the submission of original papers on all
topics related to LLMs and cybersecurity, with special interest in but not
limited to:</p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc">
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs-empowered
     defensive strategies</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Offensive
     approaches using LLMs</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs and
     cybercrime laws</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Chatbot
     software/Apps (BERT, T5, ChatGPT, GPT-4, Falcon 180B , ...) impact on
     cybersecurity education</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLM for
     creating cybersecurity policies</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Security of
     LLM-generated code</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs-driven
     threat modeling</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs for
     Solving Offensive Security Challenges such as Capture the Flag</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Reliability
     Issues of using LLMs in the cybersecurity context</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs for
     generation and analysis of Cyber Threat Intelligence (CTI)</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Privacy
     issues of LLMs and privacy-preserving LLMs</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">Generating
     Adversarial machine learning examples using LLMs</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs driven
     threat prevention</li>
 <li class="MsoNormal" style="line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif">LLMs based
     cybersecurity awareness framework</li>
</ul>

<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif"><b><u>Submissions Guidelines and Proceedings</u></b></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:105%;font-size:11pt;font-family:Calibri,sans-serif">Manuscripts should be prepared in 10-point font using the IEEE 8.5"
x 11" two-column format. All papers should be in PDF format, and submitted
electronically at Paper Submission Link. A full paper can be up to 8 pages
(including all figures, tables and references). Submitted papers must present
original unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines may be rejected
without review. Also submissions received after the due date, exceeding length
limit, or not appropriately structured may also not be considered. Authors may
contact the Program Chair for further information or clarification. All
submissions are peer-reviewed by at least three reviewers. Accepted papers will
appear in the FLLM Proceeding, and be published by the IEEE Computer Society
Conference Publishing Services and be submitted to IEEE Xplore for inclusion.
Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular papers
up to 8 pages and must follow the IEEE paper format. Please include up to 7
keywords, complete postal and email address, and fax and phone numbers of the
corresponding author. Authors of accepted papers are expected to present their
work at the conference. Submitted papers that are deemed of good quality but
that could not be accepted as regular papers will be accepted as short papers. </p>

<p class="MsoNormal" style="text-align:justify;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:13.5pt;line-height:105%;color:black"></span><b>Important
Dates:</b></u></p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc">
 <li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:"Calibri Light",sans-serif;color:black"></span><b><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;color:red">Paper
     submission deadline: August 15, 2024</span></b><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;color:red"> </span></li>
 <li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Notification
     of acceptance: October 5, 2024 </span></li>
 <li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Camera-ready
     Submission: October 20, 2024</span></li>
</ul>

<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:"Calibri Light",sans-serif"> </span></p>

<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><b><u><span style="font-family:"Calibri Light",sans-serif">Contact:</span></u></b></p>

<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:13.5pt;line-height:105%;font-family:"Calibri Light",sans-serif">Please send any
inquiry on FLLM to<span style="color:black"></span>: <u><span style="color:black"><a href="mailto:emergingtechnetwork@gmail.com" target="_blank" style="color:rgb(5,99,193)"><span style="color:black"></span></a></span></u><span style="color:black"></span></span><span style="font-family:"Calibri Light",sans-serif">
</span><span style="font-size:13.5pt;line-height:105%;font-family:"Calibri Light",sans-serif"><a href="mailto:info@fllm-conference.org">info@fllm-conference.org</a></span></p>

<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="color:black"></span></p>

<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:Calibri,sans-serif"> </p>

<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:Calibri,sans-serif"> </p></div>