AI-SSS 2025: 2nd International Workshop on Artificial Intelligence for Secure Software and Systems University of Nantes Nantes, France, December 1-4, 2025 |
Conference website | https://cs.ubishops.ca/aisss/ |
Submission link | https://easychair.org/conferences/?conf=aisss2025 |
Submission deadline | October 20, 2025 |
SCOPE
Artificial Intelligence (AI) has revolutionized various industries, including cybersecurity. As cyber threats continue to evolve, AI has emerged as a powerful tool for enhancing the security of software and systems. This workshop aims to bring together researchers, practitioners, and industry experts to discuss the latest advancements, challenges, and opportunities in leveraging AI for secure software and systems.
We invite proposals for workshops to be held in conjunction with the 12th IEEE/ACM International Conference on Big Data Computing, Applications, and Technologies (BDCAT 2025), with a specific focus on "Artificial Intelligence for Secure Software and Systems".
Workshop proposals should emphasize innovative research topics and foster discussions on the latest developments in the intersection of Artificial Intelligence and security for software and systems.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
List of Topics
- Machine learning for threat detection and prevention in software and systems
- AI-driven security analytics in software repositories
- AI-based Techniques for Software Quality, Reliability, and Security
- Secure AI deployment in software and systems
- Privacy-preserving AI techniques for software and systems
- Fault Tolerance for Software Reliability Improvement
- Secure software development methodologies
- AI-powered security testing and evaluation
- Ethical considerations in AI for secure software and systems
- Metrics, Measurements, and Analysis
- Secure and Reliable Storage
- Methodology for secure code development
- Risk management and testing strategies to improve security
- Security engineering processes, from requirements to maintenance
- Software ecosystem and software supply chain security
- Distributed systems design and implementation for security
- Formal verification and other high-assurance methods for security
- Automated security analysis of protocols, source code and binaries
Contact
All questions about submissions should be emailed to
- Yasir Malik: ymalik@ubishops.ca
- Fehmi Jaafar: fjaafar@uqac.ca