Call For Papers

  • The contributions describing original, state-of-the art unpublished research, and not currently under review by another conference or journal and addressing the latest and current research are invited in AISEC 2025.
  • Best student paper award will be conferred at the conference.
  • For PhD best dissertation award the doctoral candidate is required to submit a one-page nomination letter signed by his/her Supervisor/Department or Institute Head.
  • Topics of interest for general submission include, but are not limited to:
    • AI for Threat Detection & Response
      • Machine Learning for Cyber Threat Detection
      • Deep Learning in Intrusion Detection Systems
      • AI-Powered Malware and Ransomware Detection
      • AI in Network Traffic Analysis and Anomaly Detection
      • AI-Driven Threat Intelligence and Incident Response
      • Automated Cybersecurity Incident Management
    • Adversarial AI and Security
      • Adversarial Machine Learning in Cybersecurity
      • AI-Resistant Cybersecurity Models
      • Robustness and Resilience of AI-Based Security Systems
      • Generative AI and Its Implications for Cybersecurity
      • AI in Cybersecurity Red Teaming and Attack Simulations
    • Privacy, Trust, and AI Security
      • AI and Data Privacy Regulations (GDPR, CCPA, etc.)
      • Federated Learning for Secure AI Models
      • Bias, Fairness, and Explainability in AI for Cybersecurity
      • AI for Digital Forensics and Cybercrime Investigations
      • AI and Trustworthy Computing
    • AI in Authentication and Access Control
      • AI-Powered Biometric Authentication Systems
      • AI in Multi-Factor Authentication
      • Behavioral AI for Identity and Access Management
      • AI-Based Fraud Detection and Prevention
    • AI for Cloud & IoT Security
      • AI for Secure Cloud Computing and Virtualization
      • AI-Powered Security for IoT and Smart Devices
      • AI in Edge Computing Security
      • AI-Driven API Security and Protection
    • AI in Critical Infrastructure & National Security
      • AI for Cyber Defense in Critical Infrastructure
      • AI-Powered Cybersecurity in Smart Cities
      • AI in Military and Defense Cybersecurity Applications
      • Autonomous AI Agents for National Cyber Defense
    • AI in Cyber Warfare & Offensive Security
      • AI-Driven Cyber Warfare Strategies
      • AI in Nation-State Cyber Operations
      • Automated AI-Based Cyber Offense Techniques
      • AI and Disinformation Attacks in Cybersecurity
    • Quantum Computing, AI, and Cybersecurity
      • AI for Quantum-Safe Cryptography
      • Quantum AI in Threat Modeling
      • Quantum Computing Threats to AI-Based Security
    • AI in Blockchain and Cryptographic Security
      • AI for Blockchain Security and Smart Contract Auditing
      • AI-Powered Cryptanalysis and Attack Prevention
      • AI in Zero-Knowledge Proofs and Cryptographic Techniques
    • AI in Security Operations & SOC Automation
      • AI for Security Operations Center (SOC) Automation
      • AI-Powered Cyber Risk Assessmen
      • AI in Threat Hunting and Behavioral Analytics
    • Large Language Models (LLMs) and Cybersecurity
      • Security Risks in Large Language Models (LLMs)
      • LLMs in Automated Cyber Threat Intelligence
      • AI-Powered Phishing and Social Engineering Attacks
      • Secure Development and Governance of LLM-Based Security Tools
    • Regulatory, Ethical, and Legal Aspects of AI in Cybersecurity
      • Ethical Challenges of AI in Cybersecurity
      • Legal Implications of AI-Driven Cyber Defense
      • AI Governance and Policy in Cybersecurity

Paper Submission & Review Policy

  • Guidelines: Click Here.
    (Authors are advised to prepare the manuscript as per conference guidelines)
  • Templates: LaTeX , MS-Word (Authors are suggested to prefer LaTeX template)
  • The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
  • Authors should clearly identify the problem, their contributions, and justification with respect to the state-of-the-art works.
  • The program committee would like to review papers that develop, argue, and provide results.
  • Ensure that all co-authors have approved the final version of the manuscript before submission.
  • All submitted manuscripts will undergo a single blind review process by experts in the field.
  • Authors will be notified of the acceptance status of their manuscripts and any required revisions.
  • Authors are expected to address reviewers' comments and revise their manuscripts accordingly within the specified timeframe.
  • The review process considers both the quality of writing and the scientific impact of the work. Authors should clearly identify the problem, explain their contribution(s), and justify the state-of-the-art works. The program committee would like to review those who develop, argue, and provide results.
  • Also, note that the AISEC team takes care of plagiarism (even self-plagiarism) as serious professional misconduct. All papers will be screened for plagiarism, and the AISEC team will reject them in case there exists significant overlap with the previously published papers/papers.
  • Submissions should be made through SciencesConf: https://aisec25.sciencesconf.org
Copyright and Permissions
  • By submitting your manuscript, you confirm that the work is original and has not been published elsewhere.
  • Copyright will be applicable as per the publisher.
Publication
  • A selection of papers will be published in a scopus indexed book series.
  • The indexing process with Springer is currently underway, and we are actively working to ensure the inclusion of all accepted papers in their digital library. Papers could be indexed in prestigious databases like SpringerLink, Scopus and Web of Science..
  • Selected and/or best papers may be extended for journal issues (SCI, Scopus, and DBLP indexed).
  • Elsevier-scopus
Hybrid Event
  • In case authors need an option in presenting their papers and/or attending the conference event on-line, please contact at aisec@uca.ac.ma

Award

Best PhD Disseration Award
  • The doctoral candidate is required to submit a one-page nomination letter signed by his/her Supervisor/Department or Institute Head.
  • The candidate is supposed to highlight the major contributions of the dissertation justifying the worth of the dissertation for the award.
  • Submit your nominations (with subject line AISEC2025: Phd Dissertation Award Application) to aisec@uca.ac.ma
Student Best Paper Award
  • Student best paper award will be conferred at the conference.