CYBER 2025 - The Tenth International Conference on Cyber-Technologies and Cyber-Systems
	September 28, 2025 - October 02, 2025
 CYBER 2025
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
	ISSN: 2519-8599
	ISBN: 978-1-68558-295-1 
		CYBER 2025 is colocated with the following events as part of NexTech 2025 Congress:
		  - UBICOMM 2025, The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
- ADVCOMP 2025, The Nineteenth International Conference on Advanced Engineering Computing and Applications in Sciences
- SEMAPRO 2025, The Nineteenth International Conference on Advances in Semantic Processing
- AMBIENT 2025, The Fifteenth International Conference on Ambient Computing, Applications, Services and Technologies
- EMERGING 2025, The Seventeenth International Conference on Emerging Networks and Systems Intelligence
- DATA ANALYTICS 2025, The Fourteenth International Conference on Data Analytics
- GLOBAL HEALTH 2025, The Fourteenth International Conference on Global Health Challenges
- CYBER 2025, The Tenth International Conference on Cyber-Technologies and Cyber-Systems
CYBER 2025 General Chair 
  
    
      |  |  | Steve ChanDecision Engineering Analysis Laboratory
 USA
 
 |  |  |   | 
  
 
  
    
      |  |  | Steve ChanDecision Engineering Analysis Laboratory
 USA
 
 | 
    
      |  |  |   | 
  
 
 
CYBER 2025 Steering Committee
  
    
      |  |  | Carla Merkle WestphallUFSC
 Brazil
 
 |  |  | Barbara ReUniversity of Camerino
 Italy
 
 | 
    
      |  |  | Rainer FalkSiemens AG, Corporate Technology
 Germany
 
 |  |  | Daniel KästnerAbsInt GmbH
 Germany
 
 | 
    
      |  |  | Anne CoullFlinders University, Adelaide
 Australia
 
 |  |  | Steffen FriesSiemens
 Germany
 
 | 
    
      |  |  | Sibylle FröschleTU Hamburg
 Germany
 
 |  |  | Andreas AßmuthFachhochschule Kiel
 Germany
 
 | 
    
      |  |  | Hirokazu HasegawaNational Institute of Informatics
 Japan
 
 |  |  |  | 
  
 
  
    
      |  |  | Carla Merkle WestphallUFSC
 Brazil
 
 | 
    
      |  |  | Barbara ReUniversity of Camerino
 Italy
 
 | 
    
      |  |  | Rainer FalkSiemens AG, Corporate Technology
 Germany
 
 | 
    
      |  |  | Daniel KästnerAbsInt GmbH
 Germany
 
 | 
    
      |  |  | Anne CoullFlinders University, Adelaide
 Australia
 
 | 
    
      |  |  | Steffen FriesSiemens
 Germany
 
 | 
    
      |  |  | Sibylle FröschleTU Hamburg
 Germany
 
 | 
    
      |  |  | Andreas AßmuthFachhochschule Kiel
 Germany
 
 | 
    
      |  |  | Hirokazu HasegawaNational Institute of Informatics
 Japan
 
 | 
  
 
CYBER 2025 conference tracks:
Trends            in Cybersecurity
 Blockchain and machine learning for cybersecurity; Behavioral          biometrics authentication;          Privacy by design; Anonymity of blockchain and cryptocurrencies;          Threat categorization          and threat detection; Threats on critical national          infrastructures; Gift card hacking          techniques; Medical IoT Device-to-Device communication;          Blockchain in          supporting critical infrastructures; Vulnerability on social          media spaces; Internet          of Medical Things (IOMT); Cybersecurity for digital vehicles;          Potential radicalization          on social media; Blockchain and healthcare systems; Risk-based          human behavior profiling;          Forensic recovery of cloud evidence; Hacking pacemakers;          Prediction of cyber attacks;          Ransomware cyberweapon; Liability attribution in smart          workplaces;          Cybersecurity,  laws and          regulations;  Information          from browsers by online advertising          platforms; Predicting social engineering victims; Cybercrime          awareness
Cyber Resilience
 Cyber security assessment;   Data analytics for Cyber resilience;   Organizational security (government, commercial);   Resilient smart cities;   Resilient Internet of Things (RIOT);   Cyber-cities and Cyber-environments;   Critical infrastructure security;   Back up and recovery for systems of systems;   Disaster planning and management from Cyber perspective;   Integrated and smarter sensors
Resiliency and risks
 Resiliency in smart cities; Reliability and resiliency in wireless      networks; Detecting anomalous activity; Resources constrained      systems/devices; Disruption-tolerant systems; Resiliency and access      in restricted areas; Monitoring maritime critical disasters;      Critical supply networks; Risk assessment
   
    Technologies for resiliency
 Self-organized disaster management systems; Technological      catastrophes and crises management; Deep-learning & Big Data and      disaster recovery; Disaster management in 5G uRLLC-based systems; 5G      and IoT in disaster management; Aerial Systems for Disaster      Management; IoT sensing platforms for public safety
Cyber Security
	  Security management [overall information security management in the sense of 27000 series applied to cyber systems];          Compliance management [verify/check compliance with defined policies, provide corresponding management reports];          Security administration of cyber systems [technical security management of security services];          Security and privacy regulations and laws;          Securely interconnected cyber systems [firewalls, cross-domain security solutions];          Self-securing and self-defending cyber systems;          Trust management, trust-based information processing [using possibly untrustworthy data sources in a controlled way];          Security technologies for protecting cyber systems and devices;          Identity and access management in cyber systems;          Anti-counterfeiting;          Secure production and supply chain; Cloud computing security;          Big-data security;          Advanced persistent threats;          Network traffic analysis and trace-back;          Cyberspace operations;          Incident response, investigation, and evidence handling;          Intrusion detection and prevention;          Cyberspace protection and anti-malware;          Cooperation and sharing for Cyber-defense
Cyber Infrastructure
	  Cyber-Cities and Cyber-environments;          Information technology infrastructure;          Telecommunications and networks;          Cyber-space and data centers;          Cyber-enabled control systems;          Cyber-enabled critical infrastructure systems;          Cyber-physical systems and Internet of Things;          Special application domains (smart grid, traffic management systems, autonomous driving, etc.);          Embedded processors and controllers;          Mobility in Cyber-space;          Virtualization in Cyber-space
Cyber Forensics
	  Computer and networks forensics;          Social networking forensics;          Digital forensics tools and applications;          Applications of information hiding;          Identification, authentication, and collection of digital evidence;          Anti-forensic techniques and methods;          Watermarking and intellectual property theft;          Privacy issues in network forensics;          Tools, applications, case studies, best practices
Cyber Crime
	  Cyber-crimes: Challenges in detection/prevention;          Anomalies detection;          Advanced Persistent Threats and Cyber-resilience;          BotNets and MobiNets;          Cyber crime-related investigations;          Challenges and detection of Cyber-crimes;          Network traffic analysis, traceback;          Security information and event management (SIEM);          Stealthiness improving techniques: information hiding, steganography/steganalysis, etc.
Nature-inspired and Bio-inspired Cyber-defense
 Bio-inspired anomaly & intrusion detection;          Autonomic and Adaptive Cyber-Defense;          Adaptive and Evolvable Systems;          Cooperative defense systems;          Network artificial immune systems;          Adaptation algorithms for cyber security;          Biometrics related to cyber defense;          Bio-inspired security and networking algorithms and technologies;            Biomimetics related to cyber security;          Bio-inspired cyber threat intelligence methods and systems;          Bio-inspired algorithms for dependable networks;          Correlations in moving-target techniques;          Neural networks, evolutionary algorithms, and genetic algorithms   for cyber security Prediction techniques for cyber defense;          Information hiding solutions (steganography, watermarking) and   detection
Social-inspired opportunistic mobile Cyber-systems
	  Design of cyber-physical applications for opportunistic mobile systems based on behavioral models;          Social metrics for networks and systems operations;          Application of mixed physical and online social network sensing;          Social-aware modeling, design and development of routing algorithms in cyber-physical;          Incentive mechanisms, reputation systems and key management algorithms in cyber-physical opportunistic mobile systems;          Participatory mobile sensing for mining integration in cyber-physical opportunistic mobile systems;          Experiments with cyber-physical opportunistic mobile systems
Deadlines:
	
              | Submission | Jun 27, 2025 | 
              | Notification | Jul 28, 2025 | 
              | Registration | Aug 10, 2025 | 
              | Camera ready | Aug 24, 2025 | 
    
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).