The First International Conference on Security and Cybersecurity in the AI and Digital Context
Porto, Portugal
June 7 - 11, 2026
This event will be held in hybrid mode, with both on site and remote options.
Submission:
March 12, 2026
Notification:
April 2, 2026
Registration:
April 15, 2026
Camera Ready:
April 28, 2026
Submission deadline: March 12, 2026
- At a Glance
In the age of AI and digital technology, cybersecurity is a constantly evolving and adaptive frontier. AI mechanisms increase the ability to detect, predict, and mitigate threats, but they simultaneously expand the attack surface with new vulnerabilities in models, data pipelines, and complex interconnected systems. The speed and sophistication of AI-powered attacks demand equally intelligent, scalable, and resilient defense strategies.
Conference Chairs
Prof. Dr.
Erik Buchmann
ScaDS.AI, Leipzig University, Germany
Prof. Dr.
Jörn-Marc Schmidt
IU International University of Applied Sciences, Germany
Prof. Dr.
Alexander Lawall
IU International University of Applied Sciences, Germany
Advisory Board
(to be announced)
Participate
If you want to get involved beyond submitting an article, please consider organizing a workshop, a thematic session, or a demo. Details are available on the Event Satellites page.
- Call For Papers
In the age of AI and digital technology, cybersecurity is a constantly evolving and adaptive frontier. AI mechanisms increase the ability to detect, predict, and mitigate threats, but they simultaneously expand the attack surface with new vulnerabilities in models, data pipelines, and complex interconnected systems. The speed and sophistication of AI-powered attacks demand equally intelligent, scalable, and resilient defense strategies.
In digital era, the event covers security mechanisms intended protecting people, assets, and infrastructures broadly, along with cybersecurity mechanisms specifically defend digital systems, networks, and data from online threats.”
This conference brings together researchers, engineers, security practitioners, and policymakers to address the full spectrum of system security and cybersecurity challenges, from protecting AI models and cloud infrastructures to securing IoT ecosystems, autonomous systems, and human–machine interfaces. With a focus on mechanisms, architectures, and deployable tools, the event aims to accelerate the translation of cutting-edge research into operational defenses.
By fostering interdisciplinary collaboration between AI developers, security specialists, and governance bodies, the conference focuses on practical integration strategies, regulatory harmonization, and the development of a strong security culture. Contributions should not only highlight innovative solutions but also address emerging threats that will shape the future of digital trust.
Professionals from industry, government, and academia, researchers, engineers, practitioners, and students are invited to contribute. CYBERSEC welcomes 1) full papers presenting significant research, development, application, position, or survey, 2) short papers on work-in-progress, 3) posters, 4) contributed talk presentations, as well as workshops, thematic sessions, and demos.
Prospective authors are invited to submit original, unpublished works, which are not under review in any other conference or journal. Topics of interest include, but are not limited to, the following.
Topics
- Phishing awareness and user-training platforms
- Deepfake-enabled social engineering and trust manipulation
- Insider-threat detection via behavioral analytics
- Cross-cultural cybersecurity education and awareness
- Reducing cognitive overload for analysts and SOC operators
- AI-driven operator decision-support tools, e.g., SIEM enrichment with AI-based correlation engines
- (Real-time) AI-based anomaly detection, e.g., in phishing, emails, and network traffic
- Malware distribution, sandboxing, and behavioral profiling
- Ransomware resilience (e.g., immutable backups, rapid restoration)
- DoS/DDoS reduction via adaptive traffic analysis
- Adversarial ML, model poisoning, dataset integrity monitoring
- (Generative) AI for simulating cyberattack scenarios
- Reducing false positives in AI-powered detection systems
- Social engineering awareness (voice/text deepfake detection, identity validation, etc.)
- Critical infrastructure sabotage (redundancy, prediction, anomaly detection, etc.)
- Unauthorized personal data collection and tracking
- Re-identification risks in pseudonymized and anonymized datasets
- Surveillance overreach and ethical workplace monitoring
- AI transparency, fairness, bias mitigation, and explainability
- Multi-jurisdictional AI compliance and cross-border data transfers
- AI-enhanced multi-factor and passwordless authentication
- Behavioral biometrics for continuous identity verification
- Zero-trust identity strategies for distributed workforces
- Decentralized identity (DID/Blockchain) for secure credentials
- Adaptive, risk-scored, and automated access control
- Protection of training datasets from poisoning attacks
- Model watermarking/fingerprinting for IP protection
- Verifiable inference in untrusted environments
- Preventing model theft, inversion, and reconstruction attacks
- Lightweight cryptography for constrained IoT devices
- Secure firmware updates across limited/remote networks
- Industrial IoT anomaly detection and SCADA/ICS protection
- Zero-trust architectures for IoT ecosystems
- Sensor data integrity, provenance, and energy-efficient security
- Secure SDLC practices and automated code analysis
- API security testing, monitoring, and exploitation prevention
- CI/CD pipeline protection and code verification
- Open-source dependency risk assessment (e.g., SBOM)
- Supplier risk scoring and component authenticity verification
- AI-driven incident triage, containment, and orchestration
- Forensics in AI-enabled environments (timeline reconstruction, KG-based RCA)
- Cyber resilience metrics, e.g., for AI-supported infrastructures, maturity index calculations
- Disaster recovery planning, e.g., using predictive analytics
- Governance, regulation, and standards for AI-security integration
- AI-assisted RF/signal intelligence for anomaly detection
- Jamming detection and adaptive frequency-hopping security
- Detecting covert communication channels
- Cyber-electronic warfare convergence and defense frameworks
- Digital battlefield simulation with AI-enhanced modeling
Instructions for Authors
For more information on the submission process, please consult The Detailed Instructions for Authors.
To submit your work to this event:
- Scientific Board
- Abdullah Al Arafat, Florida International University, USA
- Erik Buchmann, ScaDS.AI, Leipzig University, Germany
- Janne Merete Hagen, University of Oslo, Norway
- Rakibul Hasan, Arizona State University, USA
- Panayiotis (Panos) Kotzanikolaou, University of Piraeus, Greece
- Alexander Lawall, IU International University of Applied Sciences, Germany
- Simin Nadjm-Tehrani, Linköping University, Sweden
- Peter T. Popov, Centre for Software Reliability, City University London, UK
- Jörn-Marc Schmidt, IU International University of Applied Sciences, Germany
- Gang Tan, Pennsylvania State University, USA
- Submit an Article
Before submitting, please consult The Detailed Instructions for Authors.
To submit your work to this event:
- Event Satellites
If you are interested in organizing a workshop, a thematic session, or a demo within the program of this conference, we are looking forward to hearing from you.
The details for what this entails are available at Event Satellites. The contact information on that page will serve as the starting point with someone ready to answer any questions you may have and to help set up the required logistics.
- Camera Ready
Prepare the camera-ready following these guidelines:
- Ensure the paper is formatted according to the IEEE formatting template. See https://www.ieee.org/conferences/publishing/templates
- Consider all the comments from the reviewers that were sent with your acceptance notification email.
- Do NOT include page numbers or any copyright information.
- The length is 6 pages of text (including figures and references) in the standard IEEE two-column format above, with the possibility of 2 extra pages.
The camera ready site will be ready in time for notification.
- Registration
The registration site will be open at the same time as the notification date.
Details about the registration process are available on the Registration page.
- Publication
All accepted and registered papers (full papers and short/work in progress papers), regardless of presentation mode, will be published in the conference Proceedings under an ISBN reference and included in the Digital Library.
Proceedings: DRT Society Press
Library: DTR Society Digital Library
Accepted and registered Posters and Contributed Talks, regardless of presentation mode, will be posted on the conference webpage.
- Presentation
All accepted and registered contributions are allotted a presentation slot of 25 minutes in the conference program.
We encourage everyone to attend the conference and present in person, but we recognize that this may not always be feasible. Authors who are unable to attend physically have the option to send their presentation slides in advance to be posted online. If a prerecorded presentation video is provided, it will also be made available.
Authors who will present in person at the conference location also have the option to send their presentation slides to be posted.
The in-person sessions from the conference location will not be streamed.
For additional instructions on preparing the presentation slides and optional video, please see the Presentations page.
- Peer Review
Methodology
All submissions are peer reviewed by three or more reviewers, and evaluated based on relevance, technical content, originality, competence, significance, and presentation.
Reviewers are asked to offer constructive feedback to help the authors improve their work, regardless of whether the submission is accepted or rejected.
Reviewers are expected to adhere to our Conduct Policies.
Notification
Notification of acceptance or rejection will be issued by the evaluation system and sent to the contact author email address.
Rebuttal
Authors have a period for rebuttal of one week after notification. A rebuttal can be filed by contacting us along with the relevant data (conference name, submission number, and reason for rebuttal)
All rebuttals are answered, and the decisions are final.
- Indexing
All 2026 events are first events in their series. Indexing is planned when the events get mature and solid in terms of number of contributions and content within the coming years.
The enhanced visibility of all publications is the scientific target of the DTR Society. The proceeding will be submitted to various indexes like Google Scholar, SCOPUS, DBLP, PubMed, HCIBib, EI-Compendex, etc.
- Conference Venue
The conference will take place at:
Hotel Novotel Porto Gaia
Rua Martir Sao Sebastiao, Afurada,
4400-499 Vila Nova de Gaia
Phone: +351 22 772 8700
Email: h1050@accor.com
A group registration form will be available.
For more information about the conference venue, please consult the Hotel Novotel Porto Gaia page we have put together.
- Touristic Information
For places to visit around the conference location, please consult the Porto touristic information page.
- Program
| Location Hotel Novotel Porto Gaia Day 1: Sunday, June 7 |
||
| Time | Conference Room #1 | |
| 12:00 – End of Day | Participant Registration | |
| Invited Speeches | ||
| 19:00 – 20:00 | Welcome Reception | |
| Day 2: Monday, June 8 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:15 – 09:30 | Opening Remarks | |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| 20:00 – 22:00 | Social Dinner | |
| Day 3: Tuesday, June 9 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| Day 4: Wednesday, June 10 | ||
| Time | Conference Room #1 | Conference Room #2 |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | Presentations Session |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | Presentations Session |
| 15:30 – 16:00 | Afternoon Break | |
| 16:00 – 17:30 | Presentations Session | Presentations Session |
| Day 5: Thursday, June 11 | ||
| Time | Conference Room #1 | |
| 09:30 – 10:30 | Invited Speech | |
| 10:30 – 11:00 | Morning Break | |
| 11:00 – 12:30 | Presentations Session | |
| 12:30 – 14:00 | Lunch | |
| 14:00 – 15:30 | Presentations Session | |
| 15:30 – 16:00 | Closing Remarks | |
