The Tenth International Conference on Cyber-Technologies and Cyber-Systems

CYBER 2025

September 28, 2025 to October 02, 2025 - Lisbon, Portugal

Deadlines

Submission

Jun 27, 2025

Notification

Jul 28, 2025

Registration

Aug 10, 2025

Camera ready

Aug 24, 2025

Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).

Publication

Published by IARIA Press (operated by Xpert Publishing Services)

Archived in the Open Access IARIA ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Indexing Procedure

Affiliated Journals

CYBER 2025 - The Tenth International Conference on Cyber-Technologies and Cyber-Systems

September 28, 2025 - October 02, 2025

CYBER 2025: Awards
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

 

Awarded Papers (also Invited for IARIA Journals)

A Privacy-preserving Video Processing Pipeline
Gábor György Gulyás, Gergely Erdődi

The Domain Name Life Cycle as an Attack Surface: Systematic Threat Mapping and Defense Recommendations
Thomas Fritzler, Michael Massoth

Temporary Identification Management System Using UNIX Time for IoT Device Privacy Protection
Koki Mizoguchi, Somchart Fugkeaw, Masahito Kumazaki, Hirokazu Hasewaga, Hiroki Takakura

A File Access Permission Management System to Realize Task Transfer during Cyber Attacks
Hidetoshi Kawai, Masahito Kumazaki, Hirokazu Hasegawa, Hiroki Takakura, Masahiko Kato

Attesting the Trustworthiness of a Credential Issuer
Rainer Falk, Steffen Fries

Proposal and Implementation of a Security Enhancement Method using Route Hopping MTD for Mesh Networks
Yuto Ikeda, Hiroshi Koide

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

Selecting Cybersecurity Requirements: Effects of LLM Use and Professional Software Development Experience
Damjan Fujs, Damjan Vavpotič, Tomaž Hovelja, Marko Poženel

From Stakeholder Needs to Secure Digital Twin Services: Critical Infrastructure Use Cases within the INTACT Framework
Ilinca-Laura Burdulea, Sonika Gogineni, Stamatios Kostopoulos, Evangelos K. Markakis, Kyriakos N. Manganaris, Fotis I. Lazarakis

Integrating Cybersecurity and Digital Marketing Effectiveness: Developing a cohesive framework for SME resilience
Kathy-Ann Fletcher, Nicole Carle

Integrating the Technical Level into a Model-based Safety and Security Analysis: Why it is Necessary and How it Can be Done
Sibylle Fröschle

Contributions to Methodologies to Improve Sensor Data Quality of Cyber Physical Production Systems Through Digitalisation: A Use Case Approach
Martin Zinner, Hajo Wiemer, Kim Feldhoff, Peter Meschke, Steffen Ihlenfeldt

 

Technical Co-Sponsors and Logistic Supporters