{"id":194,"date":"2025-05-02T16:27:56","date_gmt":"2025-05-02T16:27:56","guid":{"rendered":"https:\/\/csnet-conference.org\/2025\/?page_id=194"},"modified":"2025-08-15T09:26:35","modified_gmt":"2025-08-15T09:26:35","slug":"call-for-posters-demos","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/","title":{"rendered":"Call For Posters &amp; Demos"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Call For Posters &amp; Demos Papers<\/mark><\/strong><\/h2>\n\n\n\n<p>We are excited to announce the call for Demo and Poster submissions for the CSNet 2025 conference, to be held on October 20-22, 2025 at Abu Dhabi, UAE. CSNet 2025 will center around the \u201cGenAI and Cybersecurity\u201d theme, encompassing both AI for Cybersecurity and Cybersecurity for AI. The theme highlights the challenges and opportunities of AI in reinforcing security and privacy within traditional cybersecurity domains such as cloud computing and cryptography. The integration of GenAI into cybersecurity represents a pivotal advancement with the potential to revolutionize how we protect and secure digital infrastructure.<\/p>\n\n\n\n<p>Topics that include but are not limited to:<\/p>\n\n\n\n<p>\u2022 AI for cybersecurity: challenges, opportunities, and threats.<br>\u2022 AI-based security monitoring, anomaly detection, intrusion prevention, and response.<br>\u2022 Adversarial machine learning, secure AI model training, and adversarial mitigation.<br>\u2022 AI for cyber resilience, incident response, and threat hunting.<br>\u2022 AI-powered threat modeling, risk assessment, and automation.<br>\u2022 Large Language Model (LLM)-based anomaly and malware detection.<br>\u2022 AI for blockchain, IoT, and fog\/edge computing security.<br>\u2022 Reinforcement learning and federated learning in security.<br>\u2022 Security for AI Systems (GenAI, Agentic, etc.)<br>\u2022 Privacy risks, preservation techniques, and AI for surveillance.<br>\u2022 Ethical and regulatory considerations in AI-based security.<br>\u2022 Secure federated learning and data protection.<br>\u2022 Cybersecurity for smart cities, grids, IoT, and cyber-physical systems.<br>\u2022 Blockchain, decentralized security, and secure cloud computing.<br>\u2022 Network infrastructure security, resilient systems, and secure protocols.<br>\u2022 DoS attacks, wireless security, and cryptographic key management.<br>\u2022 GenAI for Network Traffic Analysis and Threat Detection<br>\u2022 AI-Augmented Network Protocol Security<br>\u2022 Edge and Fog Computing Security with Lightweight AI<br>\u2022 Adversarial Attacks and Defenses for Networked AI Systems<br>\u2022 Privacy-Preserving AI Techniques for Network Data<br>\u2022 AI-Driven Network Forensics and Incident Response<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Submission Categories<\/mark><\/strong><\/p>\n\n\n\n<p><strong>Demos<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interactive demonstrations of innovative AI applications in cybersecurity.<\/li>\n\n\n\n<li>Submissions should include a brief description of the demo, its relevance to AI and cybersecurity, and the hardware\/software requirements<\/li>\n\n\n\n<li>Maximum of Three (3) printed pages (in Two-Column IEEE Conference Format)<\/li>\n\n\n\n<li>Demos should be submitted through EDAS: <a href=\"https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129528\">https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129528<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Posters<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visual presentations of recent research results, ongoing projects, or innovative ideas.<\/li>\n\n\n\n<li>Submissions should include a brief description of the poster, its relevance to AI and cybersecurity, and the hardware\/software requirements<\/li>\n\n\n\n<li>Maximum of Three (3) printed pages (in Two-Column IEEE Conference Format)<\/li>\n\n\n\n<li>Posters should be submitted through EDAS: <a href=\"https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129530\">https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129530<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Important Dates:<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demo &amp; Poster Submission Deadline: <strong><s><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">August 11, 2025<\/mark><\/s><\/strong> <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">August 30, 2025 (Extended)<\/mark><\/strong><\/li>\n\n\n\n<li>Demo &amp; Poster Notification of Acceptance: <s>September 1, 2025<\/s> September 15, 2035<\/li>\n\n\n\n<li>Demo &amp; Poster Camera-Ready Submission: <s>September 15, 2025<\/s> September 30, 2025<\/li>\n\n\n\n<li>Conference Date: October 20 &#8211; 22, 2025<\/li>\n<\/ul>\n\n\n\n<p>CSNet 2025 is technically sponsored by IEEE and IEEE ComSoc. All accepted and presented papers will be submitted for publication to IEEE Xplore<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call For Posters &amp; Demos Papers &hellip; <a href=\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-194","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call For Posters &amp; Demos - CSNet 2025<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call For Posters &amp; Demos - CSNet 2025\" \/>\n<meta property=\"og:description\" content=\"Call For Posters &amp; Demos Papers &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2025\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T09:26:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\",\"url\":\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\",\"name\":\"Call For Posters &amp; Demos - CSNet 2025\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#website\"},\"datePublished\":\"2025-05-02T16:27:56+00:00\",\"dateModified\":\"2025-08-15T09:26:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Call For Posters &amp; Demos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2025\/\",\"name\":\"CSNet 2025\",\"description\":\"9th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2025\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#organization\",\"name\":\"CSNet 2025\",\"url\":\"https:\/\/csnet-conference.org\/2025\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png\",\"width\":500,\"height\":500,\"caption\":\"CSNet 2025\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call For Posters &amp; Demos - CSNet 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/","og_locale":"en_US","og_type":"article","og_title":"Call For Posters &amp; Demos - CSNet 2025","og_description":"Call For Posters &amp; Demos Papers &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/","og_site_name":"CSNet 2025","article_modified_time":"2025-08-15T09:26:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/","url":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/","name":"Call For Posters &amp; Demos - CSNet 2025","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2025\/#website"},"datePublished":"2025-05-02T16:27:56+00:00","dateModified":"2025-08-15T09:26:35+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2025\/call-for-posters-demos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2025\/"},{"@type":"ListItem","position":2,"name":"Call For Posters &amp; Demos"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2025\/#website","url":"https:\/\/csnet-conference.org\/2025\/","name":"CSNet 2025","description":"9th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2025\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2025\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2025\/#organization","name":"CSNet 2025","url":"https:\/\/csnet-conference.org\/2025\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png","contentUrl":"https:\/\/csnet-conference.org\/2025\/wp-content\/uploads\/2025\/01\/cropped-csnet_logo_2025.png","width":500,"height":500,"caption":"CSNet 2025"},"image":{"@id":"https:\/\/csnet-conference.org\/2025\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":5,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/194\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/pages\/194\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2025\/wp-json\/wp\/v2\/media?parent=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}