The contributions describing original, state-of-the art unpublished research, and not currently under
review by another conference or journal and addressing the latest and current research
are invited in AISEC 2025.
Best student paper award will be conferred at the conference.
For PhD best dissertation award the doctoral candidate is required to submit a one-page nomination letter signed by his/her Supervisor/Department or Institute Head.
Topics of interest for general submission include, but are not limited to:
AI for Threat Detection & Response
Machine Learning for Cyber Threat Detection
Deep Learning in Intrusion Detection Systems
AI-Powered Malware and Ransomware Detection
AI in Network Traffic Analysis and Anomaly Detection
AI-Driven Threat Intelligence and Incident Response
Automated Cybersecurity Incident Management
Adversarial AI and Security
Adversarial Machine Learning in Cybersecurity
AI-Resistant Cybersecurity Models
Robustness and Resilience of AI-Based Security Systems
Generative AI and Its Implications for Cybersecurity
AI in Cybersecurity Red Teaming and Attack Simulations
Privacy, Trust, and AI Security
AI and Data Privacy Regulations (GDPR, CCPA, etc.)
Federated Learning for Secure AI Models
Bias, Fairness, and Explainability in AI for Cybersecurity
AI for Digital Forensics and Cybercrime Investigations
AI and Trustworthy Computing
AI in Authentication and Access Control
AI-Powered Biometric Authentication Systems
AI in Multi-Factor Authentication
Behavioral AI for Identity and Access Management
AI-Based Fraud Detection and Prevention
AI for Cloud & IoT Security
AI for Secure Cloud Computing and Virtualization
AI-Powered Security for IoT and Smart Devices
AI in Edge Computing Security
AI-Driven API Security and Protection
AI in Critical Infrastructure & National Security
AI for Cyber Defense in Critical Infrastructure
AI-Powered Cybersecurity in Smart Cities
AI in Military and Defense Cybersecurity Applications
Autonomous AI Agents for National Cyber Defense
AI in Cyber Warfare & Offensive Security
AI-Driven Cyber Warfare Strategies
AI in Nation-State Cyber Operations
Automated AI-Based Cyber Offense Techniques
AI and Disinformation Attacks in Cybersecurity
Quantum Computing, AI, and Cybersecurity
AI for Quantum-Safe Cryptography
Quantum AI in Threat Modeling
Quantum Computing Threats to AI-Based Security
AI in Blockchain and Cryptographic Security
AI for Blockchain Security and Smart Contract Auditing
AI-Powered Cryptanalysis and Attack Prevention
AI in Zero-Knowledge Proofs and Cryptographic Techniques
AI in Security Operations & SOC Automation
AI for Security Operations Center (SOC) Automation
AI-Powered Cyber Risk Assessmen
AI in Threat Hunting and Behavioral Analytics
Large Language Models (LLMs) and Cybersecurity
Security Risks in Large Language Models (LLMs)
LLMs in Automated Cyber Threat Intelligence
AI-Powered Phishing and Social Engineering Attacks
Secure Development and Governance of LLM-Based Security Tools
Regulatory, Ethical, and Legal Aspects of AI in Cybersecurity
Ethical Challenges of AI in Cybersecurity
Legal Implications of AI-Driven Cyber Defense
AI Governance and Policy in Cybersecurity
Paper Submission & Review Policy
Guidelines: Click Here. (Authors are advised to prepare the manuscript as per conference guidelines)
Templates: LaTeX , MS-Word (Authors are suggested to prefer LaTeX template)
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
Authors should clearly identify the problem, their contributions, and justification with respect to the state-of-the-art works.
The program committee would like to review papers that develop, argue, and provide results.
Ensure that all co-authors have approved the final version of the manuscript before submission.
All submitted manuscripts will undergo a single blind review process by experts in the field.
Authors will be notified of the acceptance status of their manuscripts and any required revisions.
Authors are expected to address reviewers' comments and revise their manuscripts accordingly within the specified timeframe.
The review process considers both the quality of writing and the scientific impact of the work. Authors should clearly identify the problem, explain their contribution(s), and justify the state-of-the-art works. The program committee would like to review those who develop, argue, and provide results.
Also, note that the AISEC team takes care of plagiarism (even self-plagiarism) as serious professional misconduct. All papers will be screened for plagiarism, and the AISEC team will reject them in case there exists significant overlap with the previously published papers/papers.
By submitting your manuscript, you confirm that the work is original and has not been published elsewhere.
Copyright will be applicable as per the publisher.
Publication
A selection of papers will be published in a scopus indexed book series.
The indexing process with Springer is currently underway, and we are actively working to ensure the inclusion of all accepted papers in their digital library. Papers could be indexed in prestigious databases like SpringerLink, Scopus and Web of Science..
Selected and/or best papers may be extended for journal issues (SCI, Scopus, and DBLP indexed).
Hybrid Event
In case authors need an option in presenting their papers and/or attending the
conference event on-line, please contact at aisec@uca.ac.ma
Award
Best PhD Disseration Award
The doctoral candidate is required to submit a one-page nomination letter signed by his/her Supervisor/Department or Institute Head.
The candidate is supposed to highlight the major contributions of the dissertation justifying the worth of the dissertation for the award.
Submit your nominations (with subject line AISEC2025: Phd Dissertation Award Application) to aisec@uca.ac.ma
Student Best Paper Award
Student best paper award will be conferred at the conference.