![]() |
| |||||||||||||||
AutonomousCyber 2025 : The 2nd International Workshop on Autonomous Cybersecurity | |||||||||||||||
Link: https://cybersciencelab.com/the-2nd-international-workshop-on-autonomous-cybersecurity-autonomouscyber-2025/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 2nd edition of AutonomousCyber 2025 represents a significant milestone in advancing research and development in autonomous cybersecurity. Following the success of our inaugural event, AutonomousCyber 2024, at the 31st ACM Conference on Computer and Communications Security (ACM CCS 2024) on October 18, 2024, in Salt Lake City, U.S.A. reflecting strong interest in autonomous cybersecurity, AI-driven threat detection, and self-learning security mechanisms—this edition will be hosted at ESORICS 2025, a premier venue for security and privacy research. ESORICS is uniquely suited for AutonomousCyber 2025 because it gathers a distinguished community of security and privacy experts.
Our workshop is an exciting opportunity to delve into state-of-the-art methodologies, groundbreaking technologies, and real-world applications pushing the frontiers of autonomous cybersecurity in the quest for self-resilient digital defence systems. We solicit original, unpublished, and innovative research work relevant to the theme of this workshop. We seek contributions in, but are not limited to, the following key areas of interest and topics: Foundational and Theoretical Advances: - Cognitive models for enhancing threat intelligence - Principles and theory of self-learning cybersecurity systems - Advanced in QML for proactive cyber defence - Human-machine Teaming for cyber resilience Autonomous Cybersecurity Techniques & Methods: - AI-driven threat detection and mitigation algorithms - Development of simulators for testing autonomous security system - Architectural innovations for adaptive and self-improving cybersecurity - Predictive modeling and proactive defense strategies Practical Applications and Case Studies: - AI-based automated patch management and incident response - Autonomous digital forensics and independent security investigations - Real-world implementations and lessons learned from deployed autonomous security solutions Ethical, Legal, and Operational Considerations: - Regulatory challenges of deploying autonomous cybersecurity systems - Ethical considerations in self-adaptive AI-driven cyber defenses -Continuous compliance monitoring with AI-driven systems We encourage contributions that offer novel insights, theoretical advancements, empirical evaluations, and reflections on real-world implementations in AutonomousCyber. This workshop aims to foster a deeper understanding of autonomous systems in cybersecurity and their pivotal role in shaping the future of digital security. Submission Guidelines: All accepted papers will be published in the Springer LNCS series. Submitted papers must not substantially overlap with previously published or currently under review papers for journals or conferences. The only accepted format for submission is PDF, and papers must be prepared using the Springer LNCS template from the time of submission. Papers should be a maximum of 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, with a total maximum length of 20 pages. Please note that committee members are not required to read the appendices, so the main content of the paper should be fully understandable without them. All submissions must be written in English. Failure to follow these guidelines may result in rejection without review, regardless of the quality of the work. If accepted, authors must agree to the Springer LNCS copyright terms and must commit to presenting their papers at the workshop. 📝 Track Selection: Authors are kindly requested to select the “Autonomous Cybersecurity” track when submitting papers that focus on autonomous threat detection, AI-driven cyber defense, and adaptive security systems. 📥 Submission Site: https://easychair.org/conferences/?conf=esorics2025 Important Dates Submission Deadline: June 20, 2025 Author Notification: July 20, 2025 Camera-ready Submission: August 1, 2025 Organizers of the Workshop: Ali Dehghantanha, Canada Research Chair and Associate Professor, University of Guelph, ON, Canada Reza Parizi, Director of Decentralized Science Lab and Associate Professor, Kennesaw State University, USA Gregory Epiphaniou, Associate Professor of Security Engineering, University of Warwick, UK Abbas Yazdinejad, University of Toronto, ON, Canada Workshop Chairs Ali Dehghantanha, University of Guelph, ON, Canada Reza M. Parizi, Kennesaw State University, USA Gregory Epiphaniou, University of Warwick, UK Publication Chair Abbas Yazdinejad, University of Toronto, ON, Canada Publicity Chairs Tooska Dargahi, Manchester Metropolitan University, UK Tao Li, City University of Hong Kong, Hong Kong Program Committee Ehab Al-Shaer, Carnegie Mellon University, USA Benjamin C. M. Fung, McGill University, Canada Andy Applebaum, Apple Inc, USA Melody Wolk, Apple Inc, USA Patrick Dwyer, Apple Inc, USA Vasilios Mavroudis, Alan Turing Institute, UK Chris Hicks, Alan Turing Institute, UK Z. Morley Mao, University of Michigan, USA Derrick Sturisky, Quantum Computing Inc., USA Mohammad Hamoudeh, King Fahad University of Petroleum and Minerals, Saudi Arabia Malka Halgamuge, RMIT University, Australia Andrew Hamilton, Cybriant, USA Alireza Jolafai, Flinders University, Australia Vasilis Katos, Bournemouth University, UK Ryan K. L. Ko, University of Queensland St Lucia, Australia Georgios Loukas, University of Greenwich, UK Haider Al-Khateeb, Aston University, UK Carsten Maple, University of Warwick, UK Nick Pitropakis, Edinburgh Napier University, Scotland Ahmad Ridley, Laboratory for Advanced Cybersecurity Research, USA Ali Safaa Sadiq Al Shakarchi, Nottingham Trent University, UK Jeff Schwartzentruber, eSentire Inc, ON, Canada Andre Weimerskirch, Lear Corporation, USA Kaiwen Zhang, ´Ecole de technologie sup´erieure, Canada Xiaojie Zhu, KAUST, Saudi Arabia |
|