{"id":233,"date":"2026-05-07T17:47:53","date_gmt":"2026-05-07T17:47:53","guid":{"rendered":"https:\/\/csnet-conference.org\/2026\/?page_id=233"},"modified":"2026-05-07T17:47:54","modified_gmt":"2026-05-07T17:47:54","slug":"call-for-posters-demos","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/","title":{"rendered":"Call For Posters &amp; Demos"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Call For Posters &amp; Demos <\/mark><\/strong><\/h2>\n\n\n\n<p>We are excited to announce the call for Demo and Poster submissions for <strong>CSNet 2026<\/strong>. This year\u2019s conference centers around the theme <strong>&#8220;GenAI and Cybersecurity,&#8221;<\/strong> encompassing both <strong>AI for Cybersecurity<\/strong> and <strong>Cybersecurity for AI<\/strong>.<\/p>\n\n\n\n<p>The integration of Generative AI (GenAI) into cybersecurity represents a pivotal advancement with the potential to revolutionize how we protect digital infrastructure. CSNet 2026 highlights the challenges and opportunities of AI in reinforcing security and privacy within traditional domains such as cloud computing, cryptography, and networked systems.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Topics of Interest<\/mark><\/strong><\/p>\n\n\n\n<p>Topics include, but are not limited to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI for Cybersecurity:<\/strong> Challenges, opportunities, and emerging threats.<\/li>\n\n\n\n<li><strong>Monitoring &amp; Detection:<\/strong> AI-based security monitoring, anomaly detection, and intrusion prevention.<\/li>\n\n\n\n<li><strong>Adversarial AI:<\/strong> Machine learning security, secure model training, and mitigation strategies.<\/li>\n\n\n\n<li><strong>Resilience &amp; Response:<\/strong> AI-powered threat hunting, incident response, and cyber resilience.<\/li>\n\n\n\n<li><strong>LLMs &amp; Automation:<\/strong> Large Language Model (LLM)-based malware detection and risk assessment.<\/li>\n\n\n\n<li><strong>Infrastructure Security:<\/strong> AI for blockchain, Internet of Things (IoT), smart cities, grids, Cooperative Intelligent Transportation Systems (C-ITS), Connected and Automated Vehicles (CAV), and fog\/edge computing.<\/li>\n\n\n\n<li><strong>Privacy &amp; Ethics:<\/strong> Privacy-preserving AI, surveillance ethics, and regulatory considerations.<\/li>\n\n\n\n<li><strong>Network Specifics:<\/strong> GenAI for traffic analysis, AI-augmented protocol security, and network forensics.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Submission Categories<\/mark><\/strong><\/p>\n\n\n\n<p><strong>1. Demos<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scope:<\/strong> Interactive demonstrations of innovative AI applications in cybersecurity.<\/li>\n\n\n\n<li><strong>Requirements:<\/strong> Submissions must include a brief description of the demo, its relevance to AI\/Cybersecurity, and specific hardware\/software requirements.<\/li>\n\n\n\n<li><strong>Format:<\/strong> Maximum of <strong>three (3) pages<\/strong> (IEEE Two-Column Conference Format).<\/li>\n\n\n\n<li><strong>Submission:<\/strong> Submit via EDAS:<a href=\"https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129528\"> https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129528<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>2. Posters<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scope:<\/strong> Visual presentations of recent research results, ongoing projects, or innovative conceptual ideas.<\/li>\n\n\n\n<li><strong>Requirements:<\/strong> Submissions should include a description of the poster and its alignment with the conference theme.<\/li>\n\n\n\n<li><strong>Format:<\/strong> Maximum of <strong>three (3) pages<\/strong> (IEEE Two-Column Conference Format).<\/li>\n\n\n\n<li><strong>Submission:<\/strong> Submit via EDAS:<a href=\"https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129530\"> https:\/\/edas.info\/newPaper.php?c=33530&amp;track=129530<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Important Dates<\/mark><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Demo &amp; Poster Submission Deadline: <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">August 10, 2026<\/mark><\/strong><\/li>\n\n\n\n<li>Demo &amp; Poster Notification of Acceptance: September 1, 2036<\/li>\n\n\n\n<li>Demo &amp; Poster Camera-Ready Submission: September 15, 2026<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong> Please ensure all submissions adhere to the IEEE formatting guidelines to be eligible for review and publication.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call For Posters &amp; Demos We &hellip; <a href=\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-233","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Call For Posters &amp; Demos - CSNet 2026<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call For Posters &amp; Demos - CSNet 2026\" \/>\n<meta property=\"og:description\" content=\"Call For Posters &amp; Demos We &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2026\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T17:47:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\",\"name\":\"Call For Posters &amp; Demos - CSNet 2026\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\"},\"datePublished\":\"2026-05-07T17:47:53+00:00\",\"dateModified\":\"2026-05-07T17:47:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2026\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Call For Posters &amp; Demos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"name\":\"CSNet 2026\",\"description\":\"10th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\",\"name\":\"CSNet 2026\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"width\":512,\"height\":512,\"caption\":\"CSNet 2026\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call For Posters &amp; Demos - CSNet 2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/","og_locale":"en_US","og_type":"article","og_title":"Call For Posters &amp; Demos - CSNet 2026","og_description":"Call For Posters &amp; Demos We &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/","og_site_name":"CSNet 2026","article_modified_time":"2026-05-07T17:47:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/","url":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/","name":"Call For Posters &amp; Demos - CSNet 2026","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2026\/#website"},"datePublished":"2026-05-07T17:47:53+00:00","dateModified":"2026-05-07T17:47:54+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2026\/call-for-posters-demos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2026\/"},{"@type":"ListItem","position":2,"name":"Call For Posters &amp; Demos"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2026\/#website","url":"https:\/\/csnet-conference.org\/2026\/","name":"CSNet 2026","description":"10th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2026\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2026\/#organization","name":"CSNet 2026","url":"https:\/\/csnet-conference.org\/2026\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","contentUrl":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","width":512,"height":512,"caption":"CSNet 2026"},"image":{"@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":1,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/233\/revisions\/234"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/media?parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}