Call for Paper

The organizing committee of the CAIS conference, organized by Al-Mansour University College in Baghdad, is pleased to invite academics, researchers and practitioners from all over the world to participate by submitting their scientific research. This conference will be held on September 17-18, 2025 at the Babylon Rotana Hotel, in the center of the Iraqi capital, Baghdad, on the banks of the Tigris River, where the event brings together thought leaders and experts in the fields of artificial intelligence and cybersecurity.

This conference represents a unique platform that brings together academic and scientific expertise, with the aim of exchanging ideas and enhancing cooperation in addressing modern challenges in cybersecurity and artificial intelligence applications. The conference topics include many topics covering the latest research in encryption, key management, privacy, machine learning models, natural language processing, computer vision, and more.

We invite all researchers to participate with us in the CAIS 2025 conference and present their scientific contributions in the fields of artificial intelligence and cybersecurity, which contributes to the development of knowledge and achieving real progress that serves the scientific community and faces modern challenges.

The conference aims to encourage scientific research and provide a platform for discussion on the latest developments in artificial intelligence and cybersecurity, contributing to the development of applied solutions to address the challenges facing these vital areas. Researchers are invited to submit their original and unpublished research, which is consistent with the conference themes, and includes areas such as (but are not limited to):

Cryptography

Key management
Public key (asymmetric) techniques
Symmetric cryptography and hash functions
Cryptanalysis and other attacks
Information-theoretic techniques
Mathematical foundations of cryptography

Formal methods and theory of security

Trust frameworks
Security requirements
Formal security models
Logic and verification

Security services

Authentication
Access control
Pseudonymity, anonymity and untraceability
Privacy-preserving protocols
Digital rights management
Authorization

Intrusion/anomaly detection and malware mitigation

Malware and its mitigation
Intrusion detection systems
Social engineering attacks

Security in hardware

Tamper-proof and tamper-resistant designs
Embedded systems security
Hardware security implementation
Hardware attacks and countermeasures
Hardware reverse engineering

Systems security

Operating systems security
Browser security
Distributed systems security
Information flow control
Denial-of-service attacks
Firewalls
Vulnerability management
File system security

Network security

Security protocols
Web protocol security
Mobile and wireless security
Denial-of-service attacks
Firewalls

Database and storage security

Data anonymization and sanitization
Management and querying of encrypted data
Information accountability and usage control
Database activity monitoring

Software and application security

Software security engineering
Web application security
Social network security and privacy
Domain-specific security and privacy architectures
Software reverse engineering

Artificial intelligence

Natural language processing
Knowledge representation and reasoning
Planning and scheduling
Search methodologies
Control methods
Philosophical/theoretical foundations of artificial intelligence
Distributed artificial intelligence
Computer vision

Machine learning

Learning paradigms
Learning settings
Machine learning approaches
Machine learning algorithms
Cross-validation

Important Dates

Opening of research submissions:
January 4, 2025

Deadline for receiving research:
March 20, 2025

Announcement of acceptance results:
May 29, 2025

Conference date:
September 17-18, 2025

Evaluation and publication procedures

All submitted papers will undergo a rigorous, multi-stage review process conducted by an international panel of experts. Each submission will be evaluated initially by a specialized review committee to ensure it meets the conference’s formatting and submission standards. Following this, the papers will be assigned to at least three independent reviewers with expertise in the relevant field, who will assess each paper based on originality, scientific quality, practical relevance, and clarity of presentation. Reviewers will provide detailed feedback, highlighting strengths and suggesting areas for improvement. This comprehensive review process ensures that only high-quality research with significant contributions to the field will be presented at the conference.

After the initial reviews, authors may be asked to revise their papers in response to reviewer comments. Revised submissions will then be re-evaluated to ensure that necessary changes have been incorporated and that the paper meets the conference’s high standards. The final decision on acceptance will be made by the conference’s program committee, based on the reviewers’ recommendations and the paper’s alignment with the conference themes.