The First International Conference on Security and Cybersecurity in the AI and Digital Context
Porto, Portugal
June 7 - 11, 2026
This event will be held in hybrid mode, with both on site and remote options.
Submission:
February 12, 2026
Notification:
April 2, 2026
Registration:
April 15, 2026
Camera Ready:
April 28, 2026
Submission deadline: February 12, 2026
- At a Glance
In the age of AI and digital technology, cybersecurity is a constantly evolving and adaptive frontier. AI mechanisms increase the ability to detect, predict, and mitigate threats, but they simultaneously expand the attack surface with new vulnerabilities in models, data pipelines, and complex interconnected systems. The speed and sophistication of AI-powered attacks demand equally intelligent, scalable, and resilient defense strategies.
Conference Chairs
Prof. Dr.
Erik Buchmann
ScaDS.AI, Leipzig University, Germany
Prof. Dr.-Ing.
Jörn-Marc Schmidt
IU International University of Applied Sciences, Germany
Prof. Dr.
Alexander Lawall
IU International University of Applied Sciences, Germany
Advisory Board
(to be announced)
Participate
If you want to get involved beyond submitting an article, please consider organizing a workshop, a thematic session, or a demo. Details are available on the Event Satellites page.
- Call For Papers
In the age of AI and digital technology, cybersecurity is a constantly evolving and adaptive frontier. AI mechanisms increase the ability to detect, predict, and mitigate threats, but they simultaneously expand the attack surface with new vulnerabilities in models, data pipelines, and complex interconnected systems. The speed and sophistication of AI-powered attacks demand equally intelligent, scalable, and resilient defense strategies.
In digital era, the event covers security mechanisms intended protecting people, assets, and infrastructures broadly, along with cybersecurity mechanisms specifically defend digital systems, networks, and data from online threats.”
This conference brings together researchers, engineers, security practitioners, and policymakers to address the full spectrum of system security and cybersecurity challenges, from protecting AI models and cloud infrastructures to securing IoT ecosystems, autonomous systems, and human–machine interfaces. With a focus on mechanisms, architectures, and deployable tools, the event aims to accelerate the translation of cutting-edge research into operational defenses.
By fostering interdisciplinary collaboration between AI developers, security specialists, and governance bodies, the conference focuses on practical integration strategies, regulatory harmonization, and the development of a strong security culture. Contributions should not only highlight innovative solutions but also address emerging threats that will shape the future of digital trust.
Professionals from industry, government, and academia, researchers, engineers, practitioners, and students are invited to contribute. CYBERSEC welcomes 1) full papers presenting significant research, development, application, position, or survey, 2) short papers on work-in-progress, 3) posters, 4) contributed talk presentations, as well as workshops, thematic sessions, and demos.
Prospective authors are invited to submit original, unpublished works, which are not under review in any other conference or journal. Topics of interest include, but are not limited to, the following.
Topics
- AI-based phishing detection and prevention training
- Adaptive security awareness programs
- Gamified cybersecurity drills with AI scoring
- Insider threat detection through behavioral analysis
- Social engineering attack simulations
- AI for monitoring policy compliance in real time
- Cross-cultural approaches to cybersecurity education
- Reducing cognitive overload in security operations teams
- Ethical considerations in security surveillance AI
- Digital forensics skills training for AI-related incidents
- Phishing campaigns for AI-driven email anomaly detection and user training,
- Malware distribution (sandboxing, behavioral analysis)
- Ransomware (immutable, secure backups)
- Monitoring for insider treats and credentials misuse
- Adaptive rate and traffic profiling for Denial-of-Service (DoS/DDoS)
- Audits and vendor risk assessment for supply chain
- Compliance scans and automated audits for misconfigurations
- IoT devices (attestation, authentication, secure firmware updates)
- Adversarial AI attacks (robust model training, adversarial testing, etc.)
- Model poisoning (dataset provenance, integrity)
- Data breaches (encryption, anomaly detection on data flows, etc.)
- Credential theft (multi-factor authentication, etc.)
- Social engineering awareness (voice/text deepfake detection, identity validation, etc.)
- Critical infrastructure sabotage (redundancy, prediction, anomaly detection, etc.)
- Zero-day exploits and shared threat intelligence
- Cross-source verification for fake news and disinformation
- Network behavior analysis for automated botnets
- SCADA protocols and industrial control system hijacking
- Federated learning protections and privacy violations
- AI-driven intrusion detection of advanced persistent threats
- Continuous authentication and bypass attempts
- Fighting web application exploits (SQLi, XSS)
- Privilege enforcement modes and automated identity governance
- Threats through API exploitation
- TLS attacks, man-in-the-middle attacks (certificate pinning)
- Detection of DNS hijacking and spoofing
- Passwordless login, credential stuffing, AI-based user verification
- Mechanisms for prevention of session hijacking
- Cryptojacking and resource anomaly detection
- Detection of malicious apps, mobile malware and app cloning
- Behavioral baselines and continuous risk scoring for insider credentials
- Profiling IoT botnet propagation
- Prevention of critical protocol exploits (e.g., BGP hijacking)
- Pipeline monitoring for supply chains (CI/CD attacks)
- Code provenance and insecure (AI-based) code generation
- Secret vaulting and credential leaks
- Cross-tenant cloud attacks
- Detect deepfake-enabled spear phishing
- Mechanisms for AI model exfiltration (model theft)
- Unauthorized personal data collection
- Profiling and behavioral tracking (federated learning)
- Data re-identification from anonymized sets
- Widespread mass surveillance and surveillance overreach
- Liveness detection and biometric data misuse
- Geofencing controls and location tracking abuse
- Privacy-preserving and cross-platform identity correlation
- Dark patterns in consent and user-centric interface design
- Explainability and uninformed AI-driven decision-making
- Fairness audits and bias and discrimination in automated systems
- Protection of erosion of trust in digital services
- Deepfake-driven misinformation
- Traceability and Data sharing accountability
- Algorithmic opacity and interpretable/explainable models
- Mechanisms for trust collapse from repeated breaches
- Privacy-preserving computation and AI misuse of personal health/genomic data
- Privacy-aware monitoring and unethical surveillance in workplaces and common places
- Parental transparency and children’s data exploitation tools
- Multi-jurisdictional compliance and cross-border data transfers
- Human-in-the-loop assurance and trust erosion in AI assistants
- AI-enhanced multi-factor authentication
- Behavioral biometrics for continuous verification
- Decentralized identity management using blockchain
- Adaptive access control with risk scoring
- Preventing credential stuffing with ML-based detection
- Role-based access models for AI systems
- Zero-trust authentication for remote workforces
- Passwordless authentication technologies
- Facial and voice recognition with anti-spoofing safeguards
- Session hijacking prevention in digital services
- Sensor fusion for predictive maintenance
- Real-time vibration and acoustic anomaly Detection
- Machine learning (ML) models for wear pattern recognition
- Thermal imaging analysis for equipment health
- Cloud-Edge AI for on-site condition assessment
- AI-based failure probability forecasting
- Adaptive thresholding in sensor-based monitoring
- Pattern recognition in multivariate time-series data
- Explainable condition monitoring models
- Automated alerts and decision support for operators
- Machine learning models for anomaly detection in real time
- AI-driven behavioral profiling for intrusion detection
- Automated threat intelligence aggregation and analysis
- Deep learning for zero-day malware identification
- Integrating AI with SIEM (Security Information and Event Management) systems
- Predictive analytics for proactive threat mitigation
- AI-enabled deception and honeypot systems
- Correlation engines for multi-vector attack detection
- Using generative AI to simulate cyberattack scenarios
- Reducing false positives in AI-based detection systems
- Securing data ingestion and preprocessing stages
- Protecting training datasets from poisoning attacks
- Adversarial example detection and mitigation
- Secure model deployment in edge and cloud environments
- Watermarking and fingerprinting AI models for IP protection
- Model robustness testing under adversarial conditions
- Preventing model inversion and reconstruction attacks
- Supply-chain security in AI model development
- Verifiable AI inference in untrusted environments
- Secure storage and transfer of model weights
- AI-driven automated incident triage
- Threat containment orchestration with AI
- Digital forensics in AI-enabled environments
- Root cause analysis using knowledge graphs
- Machine learning for attack path reconstruction
- Disaster recovery automation with predictive analytics
- Cyber resilience metrics for AI systems
- Playbook automation for security operations centers
- Threat hunting with reinforcement learning agents
- Cross-organization coordination during large-scale cyberattacks
- AI-Assisted signal intelligence analysis
- Electromagnetic spectrum anomaly detection
- Real-Time spectrum allocation for cyber defense
- Deep learning for RF fingerprinting of devices
- AI-powered jamming detection and mitigation
- Cyber-physical convergence in electronic warfare
- Adaptive frequency hopping for secure communication
- AI-based detection of covert electromagnetic channels
- Integrated cyber-electronic warfare threat response frameworks
- Digital battlefield simulation for cyber-electronic warfare scenarios
- Automated log correlation for incident investigation
- Knowledge graphs for forensic timeline reconstruction
- Machine learning for attack path inference
- AI-powered malware behavior profiling
- Natural language processing (NLP) for threat report mining
- Forensic data integrity verification using blockchain
- Neural network (NN) models for anomaly clustering
- AI-enhanced memory dump and artifact analysis
- Automated root cause hypothesis generation
- Explainable AI for forensic evidence interpretation
- AI-driven risk scoring of suppliers
- Detection of counterfeit components via machine vision
- Blockchain-backed supply chain verification
- Monitoring real-time threats in logistics networks
- Predictive disruption modeling for critical assets
- Simulation for supply chain resilience using digital twin
- IoT-enhanced asset tracking with anomaly detection
- AI for compliance verification across vendors
- Data Fusion from heterogeneous supply chain sources
- Automated Incident response in distributed logistics
- AI-assisted secure coding practices
- Automated static and dynamic code analysis
- Software composition analysis for dependency security
- Integrating security testing into CI/CD pipelines
- Runtime application self-protection (RASP) mechanisms
- Vulnerability prediction models using AI
- API security testing and monitoring
- Mitigating risks in open-source AI frameworks
- Threat modeling for AI-enabled applications
- Secure decommissioning of AI-based services
- AI insecure or incomplete scripts for code generation
- AI-based alerts misclassification and threats validation
- Wrong assumption logic for rules and detection content
- Harmful changes in generated remediation suggestions
- AI-based threats mis-ranking
- Phantom Indicators of Compromise (IoCs)
- Erroneous incident timelines
- Minimize distortion in root-cause analysis
- Misdirected automated responses (wrong systems or assets)
- Detect synthetic evidence in threat reports (fabricated logs, attack artifacts)
- Prevent bias amplification in threat intelligence
- Lightweight cryptography for IoT devices
- Edge AI security architectures for distributed systems
- Resilience mechanisms for cyber-physical systems (CPS)
- Secure firmware updates over constrained networks
- AI-based device fingerprinting for authentication
- Blockchain for IoT device identity management
- Anomaly detection for industrial IoT networks
- Securing sensor data integrity and provenance
- Energy-efficient security for battery-powered devices
- Zero-trust architectures for IoT ecosystems
- Lightweight cryptography for IoT devices
- Edge AI security architectures for distributed systems
- Resilience mechanisms for cyber-physical systems (CPS)
- Secure firmware updates over constrained networks
- AI-based device fingerprinting for authentication
- Blockchain for IoT device identity management
- Anomaly detection for industrial IoT networks
- Securing sensor data integrity and provenance
- Energy-efficient security for battery-powered devices
- Zero-trust architectures for IoT ecosystems
- Regulatory frameworks for AI security
- Standards for AI risk assessment and mitigation
- Data protection compliance in AI-driven services
- AI transparency and accountability in security operations
- Security certifications for AI-enabled systems
- Implementing ethical AI principles in cybersecurity tools
- Policy-driven access to AI model APIs
- Security impact assessments for algorithm changes
- AI governance in critical infrastructure sectors
- Mapping AI security practices to ISO/IEC standards
Instructions for Authors
For more information on the submission process, please consult The Detailed Instructions for Authors.
To submit your work to this event:
- Scientific Board
(to be announced)
- Submit an Article
Before submitting, please consult The Detailed Instructions for Authors.
To submit your work to this event:
- Event Satellites
If you are interested in organizing a workshop, a thematic session, or a demo within the program of this conference, we are looking forward to hearing from you.
The details for what this entails are available at Event Satellites. The contact information on that page will serve as the starting point with someone ready to answer any questions you may have and to help set up the required logistics.
- Camera Ready
Prepare the camera-ready following these guidelines:
- Ensure the paper is formatted according to the IEEE formatting template. See https://www.ieee.org/conferences/publishing/templates
- Consider all the comments from the reviewers that were sent with your acceptance notification email.
- Do NOT include page numbers or any copyright information.
- The length is 6 pages of text (including figures and references) in the standard IEEE two-column format above, with the possibility of 2 extra pages.
The camera ready site will be ready in time for notification.
- Registration
The registration site will be open at the same time as the notification date.
Details about the registration process are available on the Registration page.
- Publication
All accepted and registered papers (full papers and short/work in progress papers), regardless of presentation mode, will be published in the conference Proceedings under an ISBN reference and included in the Digital Library.
Proceedings: DRT Society Press
Library: DTR Society Digital Library
Accepted and registered Posters and Contributed Talks, regardless of presentation mode, will be posted on the conference webpage.
- Presentation
All accepted and registered contributions are allotted a presentation slot of 25 minutes in the conference program.
We encourage everyone to attend the conference and present in person, but we recognize that this may not always be feasible. Authors who are unable to attend physically have the option to send their presentation slides in advance to be posted online. If a prerecorded presentation video is provided, it will also be made available.
Authors who will present in person at the conference location also have the option to send their presentation slides to be posted.
The in-person sessions from the conference location will not be streamed.
For additional instructions on preparing the presentation slides and optional video, please see the Presentations page.
- Peer Review
Methodology
All submissions are peer reviewed by three or more reviewers, and evaluated based on relevance, technical content, originality, competence, significance, and presentation.
Reviewers are asked to offer constructive feedback to help the authors improve their work, regardless of whether the submission is accepted or rejected.
Reviewers are expected to adhere to our Conduct Policies.
Notification
Notification of acceptance or rejection will be issued by the evaluation system and sent to the contact author email address.
Rebuttal
Authors have a period for rebuttal of one week after notification. A rebuttal can be filed by contacting us along with the relevant data (conference name, submission number, and reason for rebuttal)
All rebuttals are answered, and the decisions are final.
- Indexing
All 2026 events are first events in their series. Indexing is planned when the events get mature and solid in terms of number of contributions and content within the coming years.
The enhanced visibility of all publications is the scientific target of the DTR Society. The proceeding will be submitted to various indexes like Google Scholar, SCOPUS, DBLP, PubMed, HCIBib, EI-Compendex, etc.
- Conference Venue
The conference will take place at:
Hotel Novotel Porto Gaia
Rua Martir Sao Sebastiao, Afurada,
4400-499 Vila Nova de Gaia
Phone: +351 22 772 8700
Email: h1050@accor.com
A group registration form will be available.
For more information about the conference venue, please consult the Hotel Novotel Porto Gaia page we have put together.
- Touristic Information
For places to visit around the conference location, please consult the Porto touristic information page.
- Program
| Location Hotel Novotel Porto Gaia Day 1: Sunday, June 7 |
||
| Time | Conference Room #1 | |
| 12:00 – End of Day | Participant Registration | |
| Invited Speeches | ||
| 19:00 – 20:00 | Welcome Reception | |
| Day 2: Monday, June 8 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:15 – 09:30 | Opening Remarks | |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| 20:00 – 22:00 | Social Dinner | |
| Day 3: Tuesday, June 9 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| Day 4: Wednesday, June 10 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| Day 5: Thursday, June 11 | ||
| Time | Conference Room #1 | |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | |
| 15:30 – 16:00 | Closing Remarks | |
