The primary objective of the International Conference on Emerging Trends in Cybersecurity (ICETCS 2025) is to provide a global platform for researchers, academicians, industry professionals, and policymakers to converge, share insights, and collaboratively explore the latest advancements and emerging trends in the field of cybersecurity. This conference aims to facilitate discussions on cutting-edge research, innovative technologies, and practical solutions that address the evolving challenges posed by cyber threats in our interconnected world. By fostering interdisciplinary dialogue and knowledge exchange, the conference aims to contribute to the development of robust cybersecurity strategies, enhance collaboration between academia and industry, and ultimately strengthen collective resilience against cyber threats on a global scale. Please Note: All the accepted paper will be published in Journal of Cyber Security and Applications (Scopus Indexed Journal)
The conference invites high-quality papers in the broad areas related to ubiquitous intelligence in cyber security, cyber security challenges, cyber intelligence, analytics, and Blockchain technology from different layers of a network, cloud security and big data, and the people towards the Cyber Space. Proposals for tutorials, special sessions, workshops, forums, demos, exhibitions are also extremely welcome.
Hacking
Phishing
Supply Chain Risks
Man-in-the-Middle Attack
DNS Tunnelling
Malware and Ransomware
DoS and DDoS
Cloud and Insider Threats
Cybersecurity Awareness
Expert Support in Cybersecurity
Updating Systems and software
Prevent Database Exposure
Spyware
Strategic Threat Intelligence
Tactical Threat Intelligence
Operational Threat Intelligence
Technical Threat Intelligence
Information Gathering
Sniffing
Spoofing
Structured Query Language (SQL) Injection
Ransomeware
Scamming
Exploitation of Devices or Networks
Automatic License Plate Recognition
Automatic Traffic Control Signals and System
Digital Control System of networks in Tunnels
Passenger Announcement System
Guideway Intrusion Detection System
Closed-Circuit Television with Cyber Defence Solutions
Ticketing System
Access Control System
Distributed Control System and Operations Zone
Sensor Jamming
Blinding
Spoofing,
Saturation
Information Disclosure of Sensitive Personal and AI Data
DDoS Attacks
Manipulation of Communication Equipment
State of Cloud Security
Manual Configurations
No Disaster Recovery Plan
Domain Hijacking
Inventory Management
Bad Logging and Monitoring
Misconfigured Networks
Broken Access Control
Improper Use of Default Configs
Publicly Accessible Storage
Insecure Developer Credentials
Theories of blockchain and distributed ledger technology
New blockchain architecture
Distributed consensus and fault tolerance mechanisms
Security privacy and trust of blockchain and distributed ledger technology
Decentralization, scalability, and security tradeoff
Performance analysis and optimization
Simulation and performance evaluation techniques
Smart contract and chain code
Applications and services based on blockchain
Protocols and algorithms based on blockchain
Challenges and Solutions in IoT Device Security
Cybersecurity in IoT-enabled Cyber-Physical Systems Securing Social Networks within IoT Frameworks
IoT Supply Chain Security and Blockchain Integration
Ensuring Cyber Resilience in IoT Agriculture Systems
Security Measures for Connected and Autonomous Vehicles
Crowdsourcing and Crowdsensing Security in IoT Environments
Securing Mobile Cellular Networks in IoT Landscapes
Edge and Cloud Computing Security for IoT Infrastructure
Next-Generation Communications and Networks Security in IoT
Cryptocurrency Security in IoT Transactions
Artificial Intelligence and its Role in IoT Security
Game Theory Applications for IoT Cybersecurity
Industry 4.0 Security Challenges in IoT Implementations
Why will you submit your paper to ICETCS 2025?
Papers Submission Process
Authors interested in submitting their papers or manuscripts are kindly requested to contact us via email no later than June 02, 2025 for the direct submission link. Please include the abstract and title of your paper in your email.
For further information or to obtain the submission link, please contact:
Dr. Arafat Rahman at [email protected]
We look forward to receiving your submissions.
Paper Submission Template: Please Click Here
Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published in Journal of Cyber Security and Applications (Scopus Indexed Journal).
Call for Poster Presentations
Submission Fee: The registration fee for the authors presenting their posters is GBP 50.
Poster Template: Please Click Here
To participate, please submit your proposals via the conference website. Ensure your submission includes a brief description of the content and the main objectives of your work. We look forward to your contributions and to an exciting and informative poster session!
Poster Submission: Please email your poster to Dr. Arafat Rahman at [email protected]
Local Fees: GBP 350
Overseas Fees: GBP 350
Local Fees: GBP 400
Overseas Fees: GBP 400
Prof. Dr. Prashant Pillai, Pro Vice-Chancellor for Research and Knowledge Exchange and Director of Wolverhampton Cyber Research Institute, University of Wolverhampton, UK
Prof. Dr. Mohammed Atiquzzaman, Hitachi Chair, Presidential Professor of Computer Science, University of Oklahoma and Advisor of RITECHs, UK
Prof. Dr. Kim-Kwang Raymond Choo, University of Texas at San Antonio, U.S.
Dr. Arafatur Rahman, Reader in Cyber Security, University of Wolverhampton, UK
Dr. Shancang Li, Cardiff University, UK
Dr Nazmul Hussain, University of Nottingham
Dr. Muhammad Kamran Naeem, Lecturer in Computer Science, University of Northampton, UK
Dr. Zakirul Alam Bhuiyan, Fordham University, USA
Mohammed Nazmus Shakib, Green University, Bangladesh
Dr Faisal Saeed, Birmingham City University, UK
Dr. S M Nazmus Sadat, Universiti Malaysia Pahang, Malaysia,
Hai Tao, Baoji University of Arts and Science, China
Gunasekaran Manogaran, University of California, Davis, USA
Nour Moustafa, UNSW, Australia
Fazlullah Khan, RoZetta Institute, NSW, Australia
Mohammed Alenazi, King Saud University, Saudi Arabia
Consolee Mbarushimana, University of Wolverhampton, UK
Dr. A. Taufiq Asyhari, Monash University, Australia
Xiaokang Wang, St. Francis Xavier University, Canada
Prof. Zeeshan Pervez, University of Wolverhampton, UK
Dr. Ahmad Firdaus bin Zainal Abidin, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia
Md Jasim Uddin, Cardiff Metropolitan University, UK
Andultahman Ahmed Mohammed Al-Sewari, Universiti Malaysia Pahang, Malaysia
Dr Muhammad Kamran Naeem, University of Northampton, UK
Taha Hussein Rassem (TPC Co-Chair), Universiti Malaysia Pahang, Malaysia
Celia Shahnaz, Bangladesh University of Engineering & Technology(BUET), Bangladesh
Lounis Chermak, University of London (Birkbeck College), UK
Paul Yoo, University of London (Birkbeck College), UK
B.K. Kaushik, IIT Roorkee, India
Debajani Mitra, IIT(ISM) Dhanbad, India
Mohammad M. Hassan, King Saud University, Riyadh, KSA
Xiong Li, Hunan University of Science and Technology, China
Zubair Md. Fadlullah, Tohoku University, Sendai, Japan
Khoirul Anwar, Telkom University, Indonesia
Valentina E. Balas, Aurel Vlaicu university of Arad, Romania
Musfiq Rahman, Thompson Rivers University, Canada
Mohd Mawardi Bin Saari, Universiti Malaysia Pahang, Malaysia
Roshahliza M Ramli, Universiti Malaysia Pahang, Malaysia
Sikder M Kamruzzaman, Ryerson University, Canada
Eklas Hossain, Oregon Institute of Technology, USA
Mohammad Osiur Rahman, University of Chittagong, Bangladesh
Ganesh Gopal, Galgotias University, India
Anton Satria Prabuwono, King Abdulaziz University, Saudi Arabia
Deepak Gupta, Maharaja Agrasen Institute of Technology, Delhi, India
Waheb AbdulJabar, Universiti Malaysia Pahang, Malaysia
Muhammad Akmal Bin Ramli, University Malaysia Kelantan, Malaysia
Syifak Izhar Hisham, Universiti Malaysia Pahang, Malaysia
Belal Abdullah Al-Fuhaidi, University of Science and Technology, Yemen
Ashish Khanna, Maharaja Agrasen Institute of Technology, Delhi, India
Gandeva Bayu Satrya, Telkom University, Indonesia
Vitaliy Mezhuyev, FH JOANNEUM University of Applied Sciences, Austria
Krishna Kant Singh, GL BAJAJ Institute of Technology and Management, Greater Noida, India
B. Balamurugan, Galgotias University, India
Akansha Singh, Galgotias University, India
Nadia Refat, Universiti Malaysia Pahang, Malaysia
Safwan Mahmood Yahya Ghaleb, University Malaysia Terengganu, Malaysia
Ramdan bin Razali, RiTECHS, Malaysia
Ihsan Ullah, National University of Ireland, Galway, Ireland
Dr. Md Saiful Azad, Green University, Bangladesh
Subrta Chowdhury, SVCET Engineering college Andra Pradesh, India
Eklas Hossain, Oregon Institute of Technology, USA
DR. MOHD FAIZAL BIN AB RAZAK, Universiti Malaysia Pahang Al-Sultan Abdullah , Malaysia
Dr. Muhammad Ajmal Azad, Birmingham City University, UK
Mohammed Jumah Alenazi, King Saud bin Abdulaziz University, Saudi Arabia
Dr. Syifak Izhar, Universiti Malaysia Pahang, Malaysia
Dr Abdul Ghani, De Montfort University, UK
Dr Faisal Saeed, Birmingham City University, UK
Dr Mohemed Farah, Birmingham City University, UK
Essa Q. Shahra, Birmingham City University, UK
Dalia Elbanna, Birmingham City University, UK
Haitham Mahmoud, Birmingham City University, UK
Fuad Ghaleb, Birmingham City University, UK
Junaid Arshad, Birmingham City University, UK
Edlira Vakaj, Birmingham City University, UK
Dr Raouf Abozariba, Birmingham City University, UK
Abdurrahman Alsewari , Birmingham City University, UK
Muhammad Towfiqur Rahman, University of Asia Pacific, Bangladesh
Ehigiator Egho-Promise City of Oxford College and University Centre, Oxford UK
Md Mustafizur Rahman, Universiti Malaysia Pahang
Hamdan Bin Daniyal, Universiti Malaysia Pahang
Sabira Khatun, RiTECHS
Md Rafiqul Islam, International Islamic University Malaysia
A. H. M. Zahirul Alam, International Islamic University Malaysia
Naveen Chilamkurt, SMIEEE La Trobe University, Melbourne, Australia