<div dir="ltr"><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.8px"><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif">[Apologies if you got multiple copies of this invitation]</span></p><p class="MsoNormal" align="center" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:center;line-height:16.8px"><span style="font-size:24pt;line-height:33.6px;font-family:Calibri,sans-serif">The Fifth Intelligent Cybersecurity Conference (ICSC2025)</span><span style="font-family:Calibri,sans-serif"></span></p><p class="MsoNormal" align="center" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:center;line-height:16.8px"><span style="font-size:13.5pt;line-height:18.9px;font-family:Calibri,sans-serif;color:red">Hybrid Event</span><span style="font-family:Calibri,sans-serif"></span></p><p class="MsoNormal" align="center" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:center;line-height:16.8px"><span style="font-size:13.5pt;line-height:18.9px;font-family:Calibri,sans-serif"><a href="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.icsc-conference.org%2F2025%2F&data=05%7C02%7Cfahed.alkhabbas%40mau.se%7C70eebd387e06433b41d308dcfddab72b%7C601bc2d3e6eb42a79990b8072b680528%7C0%7C0%7C638664363045124324%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=yI4jZEN%2F33ObScHeGtXowsX7sW3NIMA3mtX%2BrNVb8yU%3D&reserved=0" target="_blank" title="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.icsc-conference.org%2F2025%2F&data=05%7C02%7Cfahed.alkhabbas%40mau.se%7C70eebd387e06433b41d308dcfddab72b%7C601bc2d3e6eb42a79990b8072b680528%7C0%7C0%7C638664363045124324%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=yI4jZEN%2F33ObScHeGtXowsX7sW3NIMA3mtX%2BrNVb8yU%3D&reserved=0" style="color:rgb(0,120,215)">https://www.icsc-conference.org/2025/</a></span><span style="font-family:Calibri,sans-serif"></span></p><p align="center" style="color:rgb(33,33,33);font-family:Aptos;font-size:16px;margin-bottom:8pt;text-align:center;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-size:13.5pt;color:black;line-height:1.2">Tampa, Florida, USA. May 19-22, 2025</span></p><p align="center" style="color:rgb(33,33,33);font-family:Aptos;font-size:16px;margin-bottom:8pt;text-align:center;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial"><span style="font-size:13.5pt;color:red;line-height:1.2">Technically Co-Sponsored by IEEE Florida West Coast Section</span></p><p class="MsoNormal" style="margin:0cm;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33)"><b><u><span style="font-size:14pt;font-family:"Times New Roman",serif;line-height:1.2">ICSC 2025 CFP:</span></u></b><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></p><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:justify"><span style="font-family:"Times New Roman",serif">In today’s world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others.<span class="gmail-Apple-converted-space"> </span></span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></p><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:justify"><span style="font-family:"Times New Roman",serif">The Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:<span class="gmail-Apple-converted-space"> </span></span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></p><ul type="disc" style="margin-bottom:0cm;color:rgb(33,33,33);font-family:Aptos;font-size:16px;margin-top:0cm"><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Intelligent systems for effective detection of cyber-attacks</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Advanced Intelligent systems and data analytics for Cloud/Edge systems security</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Malware detection using intelligent systems Vulnerability assessment</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Intelligent systems for intrusion detection in Internet of Things (IoT) systems</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Network forensics using intelligent systems and data analytics</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Data Analytics for privacy-by-design in smart health</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Datasets, benchmarks, and open-source packages</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Recourse efficient deep learning</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Adversarial Machine learning and Backdoor Attacks</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Blockchain Systems for Cyber Security</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Trustworthy AI Systems</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-family:"Times New Roman",serif">Intelligent Systems for Misinformation Detection</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li></ul><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33)"><span style="font-size:11pt;font-family:"Times New Roman",serif;line-height:1.2"> <span class="gmail-Apple-converted-space"> </span></span><b><u><span style="font-family:"Times New Roman",serif">Submissions Guidelines and Proceedings</span></u></b><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></p><p class="MsoNormal" style="margin:0cm 0cm 12pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:justify;line-height:16.8px"><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif">Manuscripts should be prepared in 10-point font using the IEEE 8.5" x 11" two-column format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper can be up to 8 pages (including all figures, tables and references). Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Authors may contact the Program Chair for further information or clarification. All submissions are peer-reviewed by at least three reviewers. Accepted papers will appear in the ICSC Proceeding, and be published by the IEEE Computer Society Conference Publishing Services and be submitted to IEEE Xplore for inclusion.<span class="gmail-Apple-converted-space"> </span><br><br>Submitted papers must include original work, and must not be under consideration for another conference or journal. Submission of regular papers up to 8 pages and must follow the IEEE paper format. Please include up to 7 keywords, complete postal and email address, and fax and phone numbers of the corresponding author. Authors of accepted papers are expected to present their work at the conference. Submitted papers that are deemed of good quality but that could not be accepted as regular papers will be accepted as short papers. Length of short papers can be up to 6 pages.<span class="gmail-Apple-converted-space"> </span></span></p><p class="MsoNormal" style="margin:0cm 0cm 12pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);text-align:justify;line-height:16.8px"><u><span style="font-size:13.5pt;line-height:18.9px;font-family:"Calibri Light",sans-serif;color:black">Important Dates:</span></u><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif"></span></p><ul type="disc" style="margin-bottom:0cm;color:rgb(33,33,33);font-family:Aptos;font-size:16px;margin-top:0cm"><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><b><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;color:red;line-height:1.2">Paper submission deadline: Jan 15th 2025</span></b><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;line-height:1.2">Notification of acceptance: April 1st, 2025<span class="gmail-Apple-converted-space"> </span></span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li><li class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:12pt;font-family:Aptos,sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;line-height:1.2">Camera-ready Submission: April 21st, 2025</span><span style="font-size:11pt;font-family:Calibri,sans-serif;line-height:1.2"></span></li></ul><p class="MsoNormal" style="margin:0cm;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.8px"><span style="font-size:11pt;line-height:15.4px;font-family:"Calibri Light",sans-serif"> </span><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif"></span></p><p class="MsoNormal" style="margin:0cm;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.8px"><b><u><span style="font-family:"Calibri Light",sans-serif">Contact:</span></u></b><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif"></span></p><p class="MsoNormal" style="margin:0cm;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.8px"><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif"> </span></p><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.8px"><span style="font-size:13.5pt;line-height:18.9px;font-family:Calibri,sans-serif">Please send any inquiry on ICSC to Fahed Alkhabbas at:<span class="gmail-Apple-converted-space"> </span><a href="mailto:fahed.alkhabbas@mau.se" target="_blank" title="mailto:fahed.alkhabbas@mau.se" style="color:rgb(0,120,215)">fahed.alkhabbas@mau.se</a></span><span style="font-size:11pt;line-height:15.4px;font-family:Calibri,sans-serif"></span></p><p class="MsoNormal" style="margin:0cm 0cm 8pt;font-size:16px;font-family:Aptos,sans-serif;color:rgb(33,33,33);line-height:16.96px"><span style="font-size:11pt;line-height:15.5467px;font-family:Calibri,sans-serif"> </span></p></div>