{"id":693,"date":"2025-05-05T08:12:03","date_gmt":"2025-05-05T08:12:03","guid":{"rendered":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/?page_id=693"},"modified":"2025-05-12T13:31:41","modified_gmt":"2025-05-12T13:31:41","slug":"the-3rd-international-workshop-on-artificial-learning-for-cyber-security-alcs-2025","status":"publish","type":"page","link":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/the-3rd-international-workshop-on-artificial-learning-for-cyber-security-alcs-2025\/","title":{"rendered":"The 3rd International Workshop on Artificial Learning for Cyber Security (ALCS)"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-49ae87ca653d45d2cef18263e0f3e36e\"><strong>Overview<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-69b01e434bebcba91c6db2e9f1e6ee8e\">Artificial learning has demonstrated its ability to resolve several complex problems in various fields including cybersecurity, which protects critical systems and sensitive information against digital attacks. This workshop aims to explore the recent artificial learning (AL) algorithms and techniques that can be utilized to resolve complex problems in the cybersecurity field such as cyberattacks, and data protection and security. It is an opportunity to present and discuss the recent fundamental and applied research works, providing novel solutions to emerging challenges in cybersecurity and other related fields.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-7da5e8f1ffe05171bba1f01f79b8ae6d\"><strong>The topics of interest include, but are not limited to, the following:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-black-color has-text-color has-link-color wp-elements-1d70f87d13310967035d936a3c154017\">Advanced AL algorithms and methods for data analytics (deep learning, statistical learning, federated learning, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-5d0a33100ccb1099cc603f33ddb0598c\">AL for cyberattacks (ransomware attacks, spoofing attacks, IoT attacks, identity-based attacks, Cloud attacks, cryptocurrency attacks, &#8230;)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-da1ec6fb87351eddb35a146ee5b64a16\">AL for Healthcare cybersecurity (patient data security, device medical security, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-4d782e7d3bc5b2f55c9d6f52b3a28366\">AL for Biometric recognition and security (authentication, identification, access control, anti-spoofing attacks, Behavioral biometrics, forensic biometrics, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-4bf6ac69ce7c17988548924fe3868df4\">AL for Blockchain (-secure data sharing, fraud detection, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-566c9505996e29655028ae428241aaf5\">AL for Cryptography (Key generation, Adversarial attacks detection, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-7374d3ef9cd1a26767f3b0a2e2319628\">AL for Telecommunication (AI-powered automation, predictive analytics, 5G network optimization, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-a7f9f9774b3621bf1160fcd5800add80\">Generative AI in Cybersecurity (vulnerabilities prediction, recommendation system, \u2026)<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-80881b015f497ef1241a517f4162a12d\">AL for data protection and security<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-e20dd46832ae8ebf53fb70d8ac9dcaeb\">AL for predictive and adaptive security<\/li>\n\n\n\n<li class=\"has-black-color has-text-color has-link-color wp-elements-ba008174ba8d3b85f63c1fc0564be279\">Related applications<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-c36732bf5041977eccba33d95f162ba7\"><strong>Important Dates<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e5db08ae023df8377585dd8392827114\">July 5, 2025 (11:59 pm CST): Due date for full workshop papers submission<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8213fa60387f38f5dbbace15e42541ac\">August 5, 2025: Notification of paper acceptance to authors<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-dcfb5a028eb1fbb0096c1ebd93157302\">Sept. 1, 2025: Camera-ready papers and registration<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d2d3bc44b559b9473878f49f11a683fd\">Oct 19-22, 2025: Workshop<\/p>\n\n\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color has-medium-font-size wp-elements-2b3aef0e9ad5f04d0dc7934f962533ae\"><strong>Program Committee<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d6b054dbc17e86137c02aced8819e438\"><strong>Workshop Program Chair<\/strong><br>Prof. Larbi Boubchir, LIASD &#8211; University of Paris 8, France<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-fb4c5bf218abde87e653998d73d7d01a\"><br><strong>Organizing Committee<\/strong><br>Prof. Larbi Boubchir, LIASD &#8211; University of Paris 8, France (Chair)<br>Prof. Boubaker Daachi, LIASD &#8211; University of Paris 8, France<br>Prof. Abdellah Mokrane, University of Paris 8, France<br>Dr. Assoc. Prof. Maidi Madjid, LIASD &#8211; University of Paris 8, France<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9ac00cf961d1ea846fe5a532228b76c6\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Artificial learning has demonstrated its ability to resolve several complex problems in various fields including cybersecurity, which protects critical systems and sensitive information against digital attacks. This workshop aims to explore the recent artificial learning (AL) algorithms and techniques that can be utilized to resolve complex problems in the cybersecurity field such as cyberattacks, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-693","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/comments?post=693"}],"version-history":[{"count":15,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/693\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/pages\/693\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/conferences.sigappfr.org\/aiccsa2025\/wp-json\/wp\/v2\/media?parent=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}