{"id":175,"date":"2024-09-09T09:40:28","date_gmt":"2024-09-09T09:40:28","guid":{"rendered":"https:\/\/csnet-conference.org\/2024\/?page_id=175"},"modified":"2024-10-16T16:33:18","modified_gmt":"2024-10-16T16:33:18","slug":"call-for-demos-posters","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/","title":{"rendered":"Call for Demos &amp; Posters"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">CSNet 2024 Call for Demos &amp; Posters <\/mark><\/strong><\/h2>\n\n\n\n<p>We are excited to announce the call for Demo, Poster, and Work In Progress submissions for the CSNet 2024 conference, to be held on December 04-06, 2024 at Paris, France. This conference aims to bring together researchers, practitioners, and industry experts to share and discuss their latest work, innovative projects, and ongoing research in the rapidly evolving field of AI for Cybersecurity.<\/p>\n\n\n\n<p>Topics that include but are not limited to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Advanced AI for Cybersecurity<\/li>\n\n\n\n<li>AI-based Cybersecurity for Next-Generation Technologies<\/li>\n\n\n\n<li>Challenges and Opportunities in AI-driven Security<\/li>\n\n\n\n<li>Emerging AI Threats and Countermeasures<\/li>\n\n\n\n<li>Privacy Preservation in AI-driven Security<\/li>\n\n\n\n<li>Privacy-preserving AI for Surveillance and Monitoring<\/li>\n\n\n\n<li>Cognitive Security and Adaptive Defense Mechanisms<\/li>\n\n\n\n<li>Advanced Deep Learning Techniques for Cyber Defense<\/li>\n\n\n\n<li>AI-driven Intrusion Detection and Prevention Systems<\/li>\n\n\n\n<li>AI-driven Security Monitoring and Anomaly Detection<\/li>\n\n\n\n<li>Cyber Threat Intelligence and Information Sharing<\/li>\n\n\n\n<li>AI-based Cybersecurity for IoT and Fog\/edge Computing<\/li>\n\n\n\n<li>Adversarial Machine Learning and AI Security<\/li>\n\n\n\n<li>AI for Cyber Resilience and Incident Response Strategies<\/li>\n\n\n\n<li>AI for Biometric Security<\/li>\n\n\n\n<li>AI for Secure Software Development and DevSecOps<\/li>\n\n\n\n<li>AI-enabled Threat Hunting and Cyber Forensics<\/li>\n\n\n\n<li>AI-enabled Ethical Hacking<\/li>\n\n\n\n<li>AI for Blockchain Technology<\/li>\n\n\n\n<li>AI-based Secure Cloud Computing and Data Protection<\/li>\n\n\n\n<li>AI-based&nbsp;&nbsp;Cybersecurity in Smart Cities\/Grids and Urban Environments<\/li>\n\n\n\n<li>AI for Secure Authentication and Access Control Mechanisms<\/li>\n\n\n\n<li>AI-powered Threat Modeling and Risk Assessment<\/li>\n\n\n\n<li>AI-driven Security Automation and Orchestration<\/li>\n\n\n\n<li>Secure AI Model Training and Adversarial Mitigation<\/li>\n\n\n\n<li>AI-driven Security Operations Center (SOC)<\/li>\n\n\n\n<li>Secure Federated Learning<\/li>\n\n\n\n<li>Federated Learning cybersecurity solutions<\/li>\n\n\n\n<li>LLM-based Anomaly Detection<\/li>\n\n\n\n<li>LLM-based Malware Detection and Classification<\/li>\n\n\n\n<li>Secure Deployment of LLM-based Security Solutions<\/li>\n\n\n\n<li>AI for Hardware-Based Attacks<\/li>\n\n\n\n<li>AI-based Vulnerability Assessment and Patch Prioritization<\/li>\n\n\n\n<li>Zero-Day Attack Detection Using AI-based Techniques<\/li>\n\n\n\n<li>Ethical and Regulatory Considerations in AI-based Security<\/li>\n\n\n\n<li>Reinforcement Learning-based Cybersecurity Solutions<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Submission Categories<\/mark><\/strong><\/h3>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Demos<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interactive demonstrations of innovative AI applications in cybersecurity.<\/li>\n\n\n\n<li>Submissions should include a brief description of the demo, its relevance to AI and cybersecurity, and the hardware\/software requirements (Demo paper format \u2013 maximum 4 pages)<\/li>\n<\/ul>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Posters<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visual presentations of recent research results, ongoing projects, or innovative ideas.<\/li>\n\n\n\n<li>Submissions should include a brief description of the poster, its relevance to AI and cybersecurity, and the hardware\/software requirements (Poster paper format \u2013 maximum 4 pages)<\/li>\n<\/ul>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Work In Progress<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Presentations of ongoing research or preliminary results.<\/li>\n\n\n\n<li>Submissions should include an extended abstract (up to 2 pages) detailing the research problem, methodology, and current findings.<\/li>\n<\/ul>\n\n\n\n<p>Proposals should be submitted through EDAS:&nbsp;<a href=\"https:\/\/edas.info\/N32449\">https:\/\/edas.info\/N32449<\/a><\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Submission deadlines: <\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demo, Poster &amp; Work In Progress Submission Deadline: <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">October 20, 2024<\/mark><\/strong><\/li>\n\n\n\n<li>Demo, Poster &amp; Work In Progress Notification of Acceptance: October 28, 2024<\/li>\n\n\n\n<li>Demo, Poster &amp; Work In Progress Camera-Ready Submission: November 4, 2024<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Contact Information<\/mark><\/strong><br>For any queries, please contact the Posters and Demos chairs at: <\/p>\n\n\n\n<p>&nbsp;<a href=\"mailto:saad.el-jaouhari@isep.fr\">saad.el-jaouhari@isep.fr<\/a><\/p>\n\n\n\n<p><a href=\"mailto:nour.el-madhoun@isep.fr\">nour.el-madhoun@isep.fr<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSNet 2024 Call for Demos &amp; &hellip; <a href=\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-175","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call for Demos &amp; Posters - CSNet 2024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call for Demos &amp; Posters - CSNet 2024\" \/>\n<meta property=\"og:description\" content=\"CSNet 2024 Call for Demos &amp; &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2024\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T16:33:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\",\"url\":\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\",\"name\":\"Call for Demos &amp; Posters - CSNet 2024\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#website\"},\"datePublished\":\"2024-09-09T09:40:28+00:00\",\"dateModified\":\"2024-10-16T16:33:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Call for Demos &amp; Posters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2024\/\",\"name\":\"CSNet 2024\",\"description\":\"8th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#organization\",\"name\":\"CSNet 2024\",\"url\":\"https:\/\/csnet-conference.org\/2024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png\",\"width\":500,\"height\":500,\"caption\":\"CSNet 2024\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call for Demos &amp; Posters - CSNet 2024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/","og_locale":"en_US","og_type":"article","og_title":"Call for Demos &amp; Posters - CSNet 2024","og_description":"CSNet 2024 Call for Demos &amp; &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/","og_site_name":"CSNet 2024","article_modified_time":"2024-10-16T16:33:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/","url":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/","name":"Call for Demos &amp; Posters - CSNet 2024","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2024\/#website"},"datePublished":"2024-09-09T09:40:28+00:00","dateModified":"2024-10-16T16:33:18+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2024\/call-for-demos-posters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2024\/"},{"@type":"ListItem","position":2,"name":"Call for Demos &amp; Posters"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2024\/#website","url":"https:\/\/csnet-conference.org\/2024\/","name":"CSNet 2024","description":"8th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2024\/#organization","name":"CSNet 2024","url":"https:\/\/csnet-conference.org\/2024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png","contentUrl":"https:\/\/csnet-conference.org\/2024\/wp-content\/uploads\/2024\/02\/cropped-csnet_logo_2024-01.png","width":500,"height":500,"caption":"CSNet 2024"},"image":{"@id":"https:\/\/csnet-conference.org\/2024\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":5,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/175\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/pages\/175\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2024\/wp-json\/wp\/v2\/media?parent=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}