The Second International Conference on Cross-Domain Security in Distributed, Intelligent and Critical Systems
CROSS-SEC 2027
March 07, 2027 to March 11, 2027 - Barcelona, Spain
Deadlines
Submission | Nov 16, 2026 |
Notification | Jan 03, 2027 |
Registration | Jan 17, 2027 |
Camera ready | Jan 31, 2027 |
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).
CROSS-SEC 2027 - The Second International Conference on Cross-Domain Security in Distributed, Intelligent and Critical Systems
March 07, 2027 - March 11, 2027
CROSS-SEC 2027
ISSN:
ISBN: 978-1-68558-493-1
CROSS-SEC 2027 is colocated with the following events as part of ComputationWorld 2027 Congress:
- SERVICE COMPUTATION 2027, The Nineteenth International Conference on Advanced Service Computing
- CLOUD COMPUTING 2027, The Eighteenth International Conference on Cloud Computing, GRIDs, and Virtualization
- FUTURE COMPUTING 2027, The Nineteenth International Conference on Future Computational Technologies and Applications
- COGNITIVE 2027, The Nineteenth International Conference on Advanced Cognitive Technologies and Applications
- ADAPTIVE 2027, The Nineteenth International Conference on Adaptive and Self-Adaptive Systems and Applications
- CONTENT 2027, The Nineteenth International Conference on Creative Content Technologies
- PATTERNS 2027, The Nineteenth International Conference on Pervasive Patterns and Applications
- COMPUTATION TOOLS 2027, The Eighteenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
- BUSTECH 2027, The Seventeenth International Conference on Business Intelligence and Technology
- AIVR 2027, The Fourth International Conference on Artificial Intelligence and Immersive Virtual Reality
- CROSS-SEC 2027, The Second International Conference on Cross-Domain Security in Distributed, Intelligent and Critical Systems
CROSS-SEC 2027 General Chair
| |
 |
Andreas Aßmuth
Kiel University of Applied Sciences
Germany
|
|
|
|
| |
 |
Andreas Aßmuth
Kiel University of Applied Sciences
Germany
|
CROSS-SEC 2027 Steering Committee
| |
 |
Christoph P. Neumann
Ostbayerische Technische Hochschule Amberg-Weiden
Germany
|
|
 |
Sebastian Fischer
Ostbayerische Technische Hochschule Regensburg
Germany
|
| |
 |
Aspen Olmsted
Wentworth Institute of Technology,
Boston
USA
|
|
 |
Steve Chan
Decision Engineering Analysis Laboratory
USA
|
| |
 |
Carla Merkle Westphall
UFSC
Brazil
|
|
 |
Manmeet Kaur Mahinderjit Singh
University Sains Malaysia
Malaysia
|
| |
 |
Hiroki Kuzuno
Kobe University
Japan
|
|
 |
Mussa Ally Dida
Nelson Mandela African Institution of Science and Technology
Tanzania
|
| |
 |
Fred Kaggwa
Mbarara University of Science and Technology (MUST)
Uganda
|
|
|
|
| |
 |
Christoph P. Neumann
Ostbayerische Technische Hochschule Amberg-Weiden
Germany
|
| |
 |
Sebastian Fischer
Ostbayerische Technische Hochschule Regensburg
Germany
|
| |
 |
Aspen Olmsted
Wentworth Institute of Technology,
Boston
USA
|
| |
 |
Steve Chan
Decision Engineering Analysis Laboratory
USA
|
| |
 |
Carla Merkle Westphall
UFSC
Brazil
|
| |
 |
Manmeet Kaur Mahinderjit Singh
University Sains Malaysia
Malaysia
|
| |
 |
Hiroki Kuzuno
Kobe University
Japan
|
| |
 |
Mussa Ally Dida
Nelson Mandela African Institution of Science and Technology
Tanzania
|
| |
 |
Fred Kaggwa
Mbarara University of Science and Technology (MUST)
Uganda
|
CROSS-SEC 2027 conference tracks:
Security Foundations and Architectures
- Trust frameworks, access control, and zero-trust models
- Governance, compliance, and security management
- Secure design for distributed systems
- Security in virtualised, containerised, or Cloud-native environments
- Identity and access across hybrid/multi-clouds
- Monitoring and observability for threat detection
Database Security
- Secure architectures for relational and non-relational databases
- Access control, encryption, and key management, Multitenant scenarios
- Threats and defenses against injection, inference, and data leakage
- Privacy, compliance, and secure data lifecycle management
IoT, OT, and Critical Infrastructure Security
- Security for edge, fog, and hybrid architectures
- Security for IIoT, smart home, and smart grid protection
- Firmware updates, device onboarding, and identity provisioning
- Threats and countermeasures in critical infrastructure systems
- Forensics in constrained environments
- Future-proof crypto life-cycle in long-lived devices
Artificial Intelligence and Security
- AI for threat and anomaly detection
- Attacks on AI: adversarial, poisoning, model theft
- Robust and trustworthy AI systems
- Privacy-preserving machine learning
Cryptographic and Privacy-Enhancing Technologies
- Post-quantum cryptography and migration
- Homomorphic encryption, secure multiparty computation
- Scalable identity and key management
- Blockchain or distributed ledgers for integrity and coordination
- Crypto-agility by design and secure reconfiguration
Application Domains and Human Factors
- Cybercrime analysed via culture, linguistics, history, and ethics
- Security in health, energy, mobility, public sector
- Usability and awareness in secure systems
Deadlines:
Submission | Nov 16, 2026 |
Notification | Jan 03, 2027 |
Registration | Jan 17, 2027 |
Camera ready | Jan 31, 2027 |
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).
Technical Co-Sponsors and Logistic Supporters