Accessing the Proceedings
All accepted and presented papers at IACyC2025 are included in the conference proceedings, which are publicly accessible and archived for reference. You can download the full proceedings or access individual papers below:
Scope of the Proceedings
The IACyC2025 Proceedings feature research in various domains of applied cybersecurity, including but not limited to:
- Emerging trends in cybersecurity and threat detection
- OSINT applications in threat intelligence and security planning
- Case studies on protecting critical infrastructure
- Security for cyber–physical systems and industrial IoT networks
- Innovations in cryptography and secure communications
- Applied cryptography and its real-world applications
- Privacy-preserving techniques in cybersecurity
- Federated learning and collaborative approaches in threat detection
- Cyber resilience strategies for mitigating advanced threats
- Securing machine learning and AI systems
- Blockchain applications in cybersecurity
- Intrusion detection and prevention systems
- Policy implications and societal impacts of cybersecurity advancements
- Forensics and incident response methodologies
Submission and Review Process
All papers included in the IACyC2025 Proceedings have undergone a rigorous peer-review process conducted by the Technical Program Committee (TPC). Submissions must adhere to IEEE format guidelines and be aligned with the conference’s thematic areas.
Archiving and Indexing
The IACyC2025 Proceedings will be archived and accessible through the conference website, ensuring long-term availability for the research community.
Future Proceedings
The International Applied Cybersecurity Conference aims to publish annual proceedings. Future conference proceedings will be made available under the Proceedings Archive section.
[Proceedings Archive] (Coming Soon)