International Workshop on Cybersecurity: Blockchain and Artificial Intelligence Applications
The 2nd International Workshop on Cybersecurity: Blockchain and Artificial Intelligence Applications (CyBAI’25) will be held within the IEEE CiSt’2025 international congress the week of 04th - 10th October 2025, Ouarzazate - Marrakech, Morocco.
The future of cybersecurity requires innovative and cutting-edge technologies to combat the growing number of cyber threats. Artificial Intelligence (AI) and Blockchain are two promising technologies that have the potential to revolutionise the field of cybersecurity. The use of AI and Blockchain can help create secure and resilient systems that can better defend against cyber attacks.
The 2nd "International Workshop on Cybersecurity: Blockchain and Artificial Intelligence Applications" invites researchers, academics, and industry professionals to submit papers on topics related to the application of AI and Blockchain in cybersecurity. The workshop aims to bring together experts in the field to share their latest research findings, exchange ideas, and discuss challenges and opportunities in the field.
Topics
Topics to be included, but are not limited to:
Evolution of Blockchain Technologies
Distributed Consensus Algorithms
Blockchain-Based Security Solutions
Scalability and Interoperability in DLTs
Sharding and Layer 2
Privacy Preserving Techniques in the Blockchain
Security of Smart contracts and dapps
Attacks and Defense Methods in Blockchain
Quantum-Resistant Cryptography for Blockchain
Blockchain-Based Energy Optimization Techniques in WSN
Blockchain-Based SDN for Secure Network Management and Control
AI for Cybersecurity
Blockchain for Federated Learning
AI for Blockchain-Based Security Systems
AI and Blockchain for Zero Trust Security
AI and Blockchain for Decentralised I&AM
Trust and Privacy in AI and Blockchain
Blockchain-Based Detection and Prevention with AI
Cyber Threat Intelligence and Response with Blockchain and AI
Secure Multi-party Computation with AI and Blockchain
Secure Hardware Enclave Design and Implementation for Cloud Security
Hardware Security Verification Techniques for Detecting Hardware Vulnerabilities
Secure Boot and Trusted Computing Platforms
Graph Neural Networks (GNNs) for Threat Detection
Large Language Models (LLMs) for Cyber Defense
AI-driven Incident Response and Threat Hunting
Machine Learning for Behavioral Analysis
AI-Powered Anomaly Detection
Chair
Paper Submission
Prospective authors should submit, by using EDAS online paper submission platform, a paper of 4 to 6 pages maximum, including references in scholarly English and describing their original work using the IEEE template.
Publication
Accepted papers will be published in the proceeding and submitted for publication in the IEEE Xplore Library, Scopus and DBLP. Furthermore, Authors of high quality papers will be invited to submit an extended version of their work for potential publication in a special issue/section of an international journal.
Important Dates
09 March 2025
Paper Submission
23 April 2025
Acceptance Notification
25 May 2025
Camera-ready Submission
10 June 2025
Author's Registration
October 04-10, 2025
Conference Dates
Contact Information
For any inquiry, contact us by email at: cist@ieee-congress.org