Call for Paper
The organizing committee of the CAIS conference, organized by Al-Mansour University College in Baghdad, is pleased to invite academics, researchers and practitioners from all over the world to participate by submitting their scientific research. This conference will be held on September 17-18, 2025 at the Babylon Rotana Hotel, in the center of the Iraqi capital, Baghdad, on the banks of the Tigris River, where the event brings together thought leaders and experts in the fields of artificial intelligence and cybersecurity.
This conference represents a unique platform that brings together academic and scientific expertise, with the aim of exchanging ideas and enhancing cooperation in addressing modern challenges in cybersecurity and artificial intelligence applications. The conference topics include many topics covering the latest research in encryption, key management, privacy, machine learning models, natural language processing, computer vision, and more.
We invite all researchers to participate with us in the CAIS 2025 conference and present their scientific contributions in the fields of artificial intelligence and cybersecurity, which contributes to the development of knowledge and achieving real progress that serves the scientific community and faces modern challenges.
The conference aims to encourage scientific research and provide a platform for discussion on the latest developments in artificial intelligence and cybersecurity, contributing to the development of applied solutions to address the challenges facing these vital areas. Researchers are invited to submit their original and unpublished research, which is consistent with the conference themes, and includes areas such as (but are not limited to):
Cryptography
Key management
Public key (asymmetric) techniques
Symmetric cryptography and hash functions
Cryptanalysis and other attacks
Information-theoretic techniques
Mathematical foundations of cryptography
Formal methods and theory of security
Trust frameworks
Security requirements
Formal security models
Logic and verification
Security services
Authentication
Access control
Pseudonymity, anonymity and untraceability
Privacy-preserving protocols
Digital rights management
Authorization
Intrusion/anomaly detection and malware mitigation
Malware and its mitigation
Intrusion detection systems
Social engineering attacks
Security in hardware
Tamper-proof and tamper-resistant designs
Embedded systems security
Hardware security implementation
Hardware attacks and countermeasures
Hardware reverse engineering
Systems security
Operating systems security
Browser security
Distributed systems security
Information flow control
Denial-of-service attacks
Firewalls
Vulnerability management
File system security
Network security
Security protocols
Web protocol security
Mobile and wireless security
Denial-of-service attacks
Firewalls
Database and storage security
Data anonymization and sanitization
Management and querying of encrypted data
Information accountability and usage control
Database activity monitoring
Software and application security
Software security engineering
Web application security
Social network security and privacy
Domain-specific security and privacy architectures
Software reverse engineering
Artificial intelligence
Natural language processing
Knowledge representation and reasoning
Planning and scheduling
Search methodologies
Control methods
Philosophical/theoretical foundations of artificial intelligence
Distributed artificial intelligence
Computer vision
Machine learning
Learning paradigms
Learning settings
Machine learning approaches
Machine learning algorithms
Cross-validation
Important Dates
Opening of research submissions:
January 4, 2025
Deadline for receiving research:
March 20, 2025
Announcement of acceptance results:
May 29, 2025
Conference date:
September 17-18, 2025
Evaluation and publication procedures
All submitted papers will undergo a rigorous, multi-stage review process conducted by an international panel of experts. Each submission will be evaluated initially by a specialized review committee to ensure it meets the conference’s formatting and submission standards. Following this, the papers will be assigned to at least three independent reviewers with expertise in the relevant field, who will assess each paper based on originality, scientific quality, practical relevance, and clarity of presentation. Reviewers will provide detailed feedback, highlighting strengths and suggesting areas for improvement. This comprehensive review process ensures that only high-quality research with significant contributions to the field will be presented at the conference.
After the initial reviews, authors may be asked to revise their papers in response to reviewer comments. Revised submissions will then be re-evaluated to ensure that necessary changes have been incorporated and that the paper meets the conference’s high standards. The final decision on acceptance will be made by the conference’s program committee, based on the reviewers’ recommendations and the paper’s alignment with the conference themes.