CALL FOR PAPERS
KEY DATES
Paper Submission Deadline: February 28, 2025
Notification of Acceptance: April 15, 2025
Camera-Ready Submission: May 26, 2025

GQEBERHA (NELSON MANDELA METROPOLITAN MUNICIPALITY )

17 AUGUST 2025 – 22 AUGUST 2025
THEME
Proactive Resilience: Securing AI and IoT Ecosystems through Integrated
Cybersecurity Strategies
Building on the success of the Cybersecurity4D 2024 virtual event, this year’s conference will provide an in-depth and holistic exploration of proactive resilience strategies for securing AI and IoT ecosystems. 2025 Cybersecurity4D (C4D2025) aims to address the critical need for holistic solutions that protect digital infrastructures while promoting sustainable development across the continent by focusing on integrated cybersecurity approaches.
Scheduled to take place in Gqeberha (Nelson Mandela Metropolitan Municipality), from Sunday 17 August 2025 – Friday 22 August 2025, the C4D2025 conference will bring together a diverse group of stakeholders, including academia in the fields such as (but not limited to) Computer Science, Information Systems, and Engineering, as well as industry, government, and civil society. The conference will provide a unique setting for participants to share knowledge, develop frameworks, and foster collaborations that enhance cybersecurity across Africa.
The Pan African Information Communication Technology Association (PAICTA) invites researchers, practitioners, policymakers, and thought leaders from across the globe to submit original papers for the Cybersecurity4D 2025 Conference. Other categories of submission such as industry talks, workshops, tutorials and demonstrations are welcome. This conference will serve as a key platform for discussing cutting-edge research and strategies for securing AI and IoT ecosystems, focusing on Africa’s unique challenges and opportunities.
The IEEE is the technical sponsor of Cybersecurity4D 2025. All submitted papers will be double-blind reviewed. Accepted papers after proper registration and presentation at the conference will be submitted for inclusion in the proceedings published on IEEE Xplore. Posters and Workshop papers will not be part of the proceedings.
Submission guidelines
All paper and poster submissions must be original and not simultaneously submitted to another journal or conference. All submissions (except industry talks, workshops, demonstrations, and tutorials) must follow the single-spaced, two-column, standard IEEE conference paper format here. . Manuscripts (i.e., papers and posters) must not contain any identifying information such as author names and affiliations, and the abstract should not exceed 250 words.
NB: Submissions for industry talks, workshops, demonstrations and tutorials should include names and affiliations of facilitators. These submissions are not required to follow a specific format but should include the following information: title/topic along with a comprehensive description with clear objectives, target audience, and anticipated outcomes. The submissions should clearly indicate the mode of delivery and timeline, and any logistical requirements, e.g., hardware and software.
Paper Submission Link: https://easychair.org/conferences/?conf=c4d2025
Paper Template is Here: https://www.ieee.org/conferences/publishing/templates.html
The following paper categories are welcome:-
Submission Type | Description |
Full Papers | Submissions describing substantial, original, and unpublished research in the field of cybersecurity, specifically focusing on the conference themes. Full papers should not exceed 10 pages. |
Short Papers | Submissions presenting work-in-progress, novel ideas, and preliminary results. Short papers should not exceed 6 pages. |
Posters | Submissions describing ongoing research, preliminary findings, or innovative ideas in cybersecurity. Poster abstracts should not exceed 2 pages. |
Industry Talks, Workshops, Tutorials and Demonstrations |
Proposals for industry talks, workshops, tutorials and demonstrations on topics relevant to the conference themes. Submissions should include names and affiliations of facilitators, along with a comprehensive description of the topic, clear objectives, and anticipated outcomes.
|
Key Dates
Submission Deadline: February 28, 2025
Acceptance Notification: April 15, 2025
Camera Ready Submission: May 26, 2025
Conference Dates: 17 – 22 August 2025
LIST OF TOPICS
We invite submissions on a wide range of topics that align with the following core themes of the conference:
● Proactive Resilience for AI and IoT Ecosystems:-
○ Innovative strategies for securing AI and IoT systems
○ Proactive threat detection and mitigation approaches
○ Security by design for AI and IoT applications
○ Risk management and resilience frameworks in AI and IoT environments
● Integrated Cybersecurity Strategies:-
○ Holistic approaches to cybersecurity in interconnected digital ecosystems
○ Cross-sectoral partnerships and collaborations for securing critical infrastructures
○ Policy and governance frameworks supporting integrated cybersecurity efforts
○ Strategies for ensuring ethical AI and IoT deployment
● Cybersecurity4D Dimensions:-
○ Digital: Securing digital assets and infrastructures
○ Diverse: Promoting inclusivity, gender diversity, and equity in cybersecurity
○ Developmental: Capacity-building, skills development, and closing the digital divide
○ Dynamic: Evolving threat landscapes and adaptive cybersecurity strategies
● Cybersecurity for Sustainable Development:-
○ The role of cybersecurity in driving sustainable economic and social development
○ Addressing the cybersecurity challenges of emerging technologies in developing regions
○ Leveraging AI and IoT for digital transformation and development in Africa
○ Design and implementation of cybersecurity solutions for developing regions
● Behavioural Aspects of Cybersecurity:-
○ Human factors in cybersecurity: addressing user behaviour and awareness
○ Psychological, social, and cultural factors influencing cybersecurity adoption
○ Behavioural cybersecurity: insights from psychology, sociology, and other disciplines
● Future Cybersecurity Frameworks for Africa:-
○ Designing frameworks tailored to the African cybersecurity landscape
○ Public-Private Partnerships (PPP) in the development of cybersecurity policies
○ Cybersecurity governance and regulatory practices for AI and IoT in Africa
Publication and Presentation
- Accepted papers will be submitted for inclusion into IEEE Xplore®, subject to meeting IEEE Xplore’s scope and quality requirements. Authors of selected papers will be invited to present their work at the conference, either in oral or poster sessions.
Sponsorship and Industry Collaboration
- In addition to academic papers, we encourage industry partners, government entities, and non-governmental organisations to participate in the conference by sponsoring or co-organising specific sessions. The Cybersecurity4D 2025 Conference offers an unparalleled opportunity to collaborate with key decision-makers and influence the development of cybersecurity strategies in Africa. For sponsorship and collaboration inquiries, please contact events@paicta.co
Cybersecurity Competitions and Summer School
- As part of the Cybersecurity4D 2025 Conference, PAICTA will host Cybersecurity Competitions and a Cybersecurity Summer School aimed at fostering practical cybersecurity skills and inspiring the next generation of cybersecurity professionals. We encourage community groups, educational institutions, and individuals to participate and contribute to these exciting initiatives.
All questions about submissions should be emailed to events@paicta.co