Call for Papers
Prospective authors are strongly encouraged to submit their original, unpublished quality research papers (which are not concurrently under review elsewhere) related to the specified tracks. Submissions should adhere to the format outlined in the Paper Template and be submitted via Microsoft CMT for possible publication in CYPHER 2026. Submitted papers must be plagiarism-free. All submissions must be in English, and papers intended for presentation should adhere to the formatting guidelines provided by the conference website.
ConferenceTracks
The scope of this conference is to provide a global platform for researchers, engineers, academicians, and industry professionals to present their latest research findings and development activities in cybersecurity, privacy, and heterogeneous emerging technologies. The conference facilitates discussion on recent advancements, challenges, and future directions in these rapidly evolving domains, enabling participants to exchange ideas, explore innovative solutions, and contribute to the global research community in the 21st century.
Track 1: : Cybersecurity for Emerging Technologies
Cybersecurity frameworks for Industry 4.0/5.0, secure architecture design, zero-trust models, risk assessment, secure DevOps, cloud security, edge and fog security, and quantum-resistant security protocols.
Track 2: Privacy-Preserving Techniques and Secure Data Sharing
Data anonymization, differential privacy, homomorphic encryption, secure multiparty computation, federated learning security, privacy-enhancing technologies, GDPR and global compliance frameworks, identity management.
Track 3: Human-Centric Design for Secure Systems
User-centred security design, privacy-by-design principles, usable security, ethics of cybersecurity, human factors in threat detection, behavioral biometrics, trust and transparency in digital systems.
Track 4: Artificial Intelligence and Machine Learning for Cyber Defense
AI-driven threat detection, deep learning for intrusion detection, adversarial machine learning, automated incident response, anomaly detection, predictive analytics for cybersecurity, threat intelligence platforms.
Track 5: Cyber-Physical Systems Security and Critical Infrastructure Protection
Security of SCADA and industrial control systems, IoT and IIoT security, smart grid and smart city infrastructure protection, autonomous vehicle security, healthcare IoT security, supply chain security.
Track 6: Blockchain, IoT, and 5G/6G Security
Secure distributed ledgers, blockchain for identity and access management, lightweight cryptography for IoT, 5G/6G network security, mobile edge computing security, secure interoperability between heterogeneous systems.
Track 7: Ethical, Legal, and Policy Aspects of Cybersecurity and Privacy
Cyber laws and digital governance, data protection policies, global cybersecurity strategies, cyber diplomacy, ethics of AI in security, privacy risk assessments, regulatory compliance and audit frameworks.
Track 8: Future Trends and Innovations in Security and Privacy
Post-quantum cryptography, emerging threat landscapes, bio-cybersecurity, digital twins security, autonomous systems security, next-generation authentication, sustainable security practices, cyber resilience frameworks.

