FUSION 2025 – deadline approaching

Dear Researcher,

Rio de Janeiro, Brazil, will host the 28th International Conference on Information Fusion from July 7-11, 2025, the first ever in South America.

Submit your contribution on sensor, data, information and knowledge fusion, associated system frameworks and systemic challenges in one of the following areas. Click on the links for detailed information (fusion2025.org):

Call for papers

  • Paper submissions due: March 1, 2025
  • Acceptance notification: May 1, 2025
  • Camera ready paper due: June 1, 2025

Link for submission: https://cmt3.research.microsoft.com/FUSION2025/Submission/Index

Reasons for attending FUSION 2025:

  • Learn about the latest scientific breakthroughs in information fusion against the unique backdrop of the Marvellous Rio de Janeiro
  • Enjoy ample networking opportunities by participating in our Social Events, including
  • Publicize your research – present your research at the premier scientific forum on information fusion and exchange with experts in the field. Accepted papers will be submitted for publication in the IEEE Xplore® Digital Library (indexed in Scopus and the Web of Science).

For questions, please contact technical@fusion2025.org
Conference website: FUSION 2025

Best regards,

The FUSION 2025 organizing committee

7d1knxtTRr3%3DdDOOG2E3ymXz6RYVM-TLWXqbcmy16zQb4Kg%40mail.gmail.com.

Introducción a la Ciberseguridad Industrial

 

Introducción a la Ciberseguridad Industrial
Prof. Ing. Diego Romero

 29 de Abril, 6, 13, 20, 27 de Mayo de 2025, 17:00 a 19:30 hs  
en forma VIRTUAL por la plataforma zoom 

 

ABSTRACT: En un mundo cada vez más digitalizado es fundamental fortalecer la seguridad en entornos industriales e infraestructuras críticas. En este curso, exploraremos los fundamentos de la ciberseguridad aplicados a instalaciones industriales y a infraestructuras críticas. Analizaremos las amenazas que enfrentan estos entornos, como ataques cibernéticos, vulnerabilidades y riesgos para la seguridad nacional y económica. Además, abordaremos dos estándares clave: IEC 62443 y el marco de ciberseguridad NIST. Únase a nosotros para fortalecer su comprensión de la ciberseguridad industrial y contribuir a un mundo más seguro. 

DESTINATARIOS: Profesionales que realizan tareas de programación, instalación, puesta en servicio y/o mantenimiento de dispositivos, equipamientos y sistemas industriales con conectividad sobre redes de datos abiertas.

CONOCIMIENTOS PREVIOS: Poseer conocimientos y experiencia en redes de datos. Se considera conveniente, pero no en forma excluyente, tener conocimientos de plataformas de automatización industrial.

OBJETIVOS: Después de completar la actividad el asistente podrá:

  • Evaluar la situación actual de la seguridad en las operaciones y las analizando las amenazas y vulnerabilidades de los Sistemas de Automatización y Control Industrial reconociendo su riesgo asociado.
  • Adquirir los conceptos de Seguridad de la Información y Ciberseguridad en Sistemas de Automatización y Control Industrial y Protección de Infraestructuras Críticas, sus definiciones y relaciones, analizando los riesgos e impacto en el negocio, tanto desde las perspectivas tecnológicas como de gestión de la seguridad.
  • Conocer las regulaciones, iniciativas, estándares, metodologías y marcos de trabajo vinculados a la ciberseguridad industrial y la protección de infraestructuras críticas.

TEMARIO:

  • Introducción
    Casos relevantes en las noticias
    Algunas estadísticas
  • Conceptos de Seguridad de la Información
    Definición y conceptos centrales
    Acerca de amenazas, ataques y vulnerabilidades
  • Ciberseguridad Industrial
    Definición y conceptos centrales
    Los 5 mitos de la ciberseguridad industrial
    Ciberseguridad Industrial y Seguridad Informática
  • Técnicas y equipamientos para la defensa de los ciberataques
    Defensa en Profundidad
    Características y Funcionalidades
    Dispositivos de Seguridad (Security Appliances)
    Dispositivos Industriales Robustos
  • Análisis de Casos
    Stuxnet – Planta de enriquecimiento de uranio en Irán
    Empresa siderúrgica en Alemania
    Filtración de datos, protocolo rsync – Robots industriales para industria automotriz
    BlackEnergy – Red de distribución eléctrica en Ucrania
    Tritón – Planta petroquímica en Medio Oriente
    NotPetya – Empresa farmacéutica multinacional
    LockerGoga – Empresa productora y procesadora de aluminio noruega
  • Estándares
    Estado actual
    ISO/IEC 27000
    ISA/IEC 62443
    Certificación Achilles
    Otros estándares
  • Herramientas de Análisis y Diagnóstico

 

Se puede abonar con tarjeta por MERCADO PAGO o por TRANSFERENCIA BANCARIA

Prof. Ing. Diego Romero: 
Ingeniero Electromecánico con Orientación en Electrónica (Facultad de Ingeniería de la Universidad de Buenos Aires), Profesor en Informática (Instituto Superior Marista).
Realizó diversos cursos de capacitación en el exterior. Está certificado como IEC 62443 Cybersecurity Fundamentals Specialist y como Schneider Electric EcoBuilding Train The Trainer.
Se desempeñó como soporte técnico, instructor y jefe de producto en diferentes empresas vinculadas a la automatización industrial y a los sistemas SCADA.


Consultas a cursos@aadeca.org o por whatsapp 011 3201-2325 
VER PROGRAMACIÓN COMPLETA DE CURSOS Y WEBINARS AQUÍ

.

Special Session on Deep Learning applied to Computer Vision, Healthcare and Robotics


SS01: Special Session on Deep Learning applied to Computer Vision, Healthcare and Robotics

 

Scope

This special session provides a platform for academics, developers, and industry related researchers belonging to the vast communities of Neural Networks, Computational Intelligence, Machine Learning, Deep Learning, Biometrics, Vision systems, Healthcare and Robotics, to discuss, share experience and explore traditional and new areas of the computer vision, machine and deep learning combined to solve a range of problems. The objective of the workshop is to integrate the growing international community of researchers working on the application of Machine Learning and Deep Learning methods in Vision, Health and Robotics to a fruitful discussion on the evolution and the benefits of this technology to the society.

Topics

 

·         Computational Intelligence methods

·         Machine Learning methods

·         Self-adaptation and self-organization

·         Robust computer vision algorithms (operation under variable conditions, object tracking, behavior analysis and learning, scene segmentation, …)

·         Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)

·         Convolutional Neural Networks CNN 

·         Recurrent Neural Networks RNN

·         Deep Reinforcement Learning DRL

·         Hardware implementation and algorithms acceleration (GPUs, FPGAs)

·         Video and Image Processing

·         Video tracking

·         3D Scene reconstruction

·         3D Tracking in Virtual Reality Environments

·         3D Volume visualization

·         Intelligent Interfaces (User-friendly Man Machine Interface)

·         Multi-camera and RGB-D camera systems

·         Multi-modal Human Pose Recovery and Behavior Analysis

·         Gesture and posture analysis and recognition

·         Medical Imaging

·         Biometric Identification and Recognition

·         Extraction of Biometric Features (fingerprint, iris, face, voice, palm, gait)

·         Surveillance systems

·         Autonomous and Social Robots

·         Robotic vision

·         Industry 4.0

·         IoT and Cyber-physical Systems


Important dates

March 30, 2026

Submission of papers

April 22, 2025

Notification

May 14, 2025

Early registration

June 16-18, 2025

IWANN Conference

 

Submission

Please, submit your paper through the IWANN 2025 website by selecting the special session SS01: Deep Learning applied to Computer Vision, Healthcare and Robotics.

Organizers

Enrique Dominguez

Universidad de Málaga

José García-Rodriguez

Universidad de Alicante

Ramón Moreno

Grupo Antolín Ingeniería

 

More information can be found at the conference website https://iwann.uma.es

 

Best regards,

ICSC 2025 Final CFP: The Fifth Intelligent Cybersecurity Conference, Tampa, Florida, USA. May 19-22, 2025


The Fifth Intelligent Cybersecurity Conference (ICSC2025)

Hybrid Event

https://www.icsc-conference.org/2025/

Tampa, Florida, USA. May 19-22, 2025

Technically Co-Sponsored by IEEE Florida West Coast Section

ICSC 2025 CFP:

In today’s world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others.

The Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity, with special interest in but not limited to:

  • Intelligent systems for effective detection of cyber-attacks
  • Advanced Intelligent systems and data analytics for Cloud/Edge systems security
  • Malware detection using intelligent systems Vulnerability assessment
  • Intelligent systems for intrusion detection in Internet of Things (IoT) systems
  • Network forensics using intelligent systems and data analytics
  • Data Analytics for privacy-by-design in smart health
  • Datasets, benchmarks, and open-source packages
  • Recourse efficient deep learning
  • Adversarial Machine learning and Backdoor Attacks
  • Blockchain Systems for Cyber Security
  • Trustworthy AI Systems
  • Intelligent Systems for Misinformation Detection

  Submissions Guidelines and Proceedings

Manuscripts should be prepared in 10-point font using the IEEE 8.5″ x 11″ two-column format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper can be up to 8 pages (including all figures, tables and references). Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Authors may contact the Program Chair for further information or clarification. All submissions are peer-reviewed by at least three reviewers. Accepted papers will appear in the ICSC Proceeding, and be published by the IEEE Computer Society Conference Publishing Services and be submitted to IEEE Xplore for inclusion.

Submitted papers must include original work, and must not be under consideration for another conference or journal. Submission of regular papers up to 8 pages and must follow the IEEE paper format. Please include up to 7 keywords, complete postal and email address, and fax and phone numbers of the corresponding author. Authors of accepted papers are expected to present their work at the conference. Submitted papers that are deemed of good quality but that could not be accepted as regular papers will be accepted as short papers. Length of short papers can be up to 6 pages.

Important Dates:

  • Paper submission deadline: Feb 28th 2025 (Final and Firm)
  • Notification of acceptance: April 1st, 2025
  • Camera-ready Submission: April 21st, 2025

 

Contact:


Please send any inquiry on ICSC to Fahed Alkhabbas at: fahed.alkhabbas@mau.se

 

📢 Call for Papers – IEEE ICAETA 2025

Dear Researchers and Industry Professionals,
We are pleased to announce the Call for Papers for the 4th International Conference on Advanced Engineering, Technology and Applications on Power Systems (ICAETA 2025), scheduled for July 31–August 1, 2025, at Shenyang University of Technology, Liaoning, China.
This esteemed conference offers a global platform for academics, scientists, and professionals to present their innovative research and gain international recognition.
Why Participate in ICAETA 2025?
  • Springer Publication: Accepted papers will be published in the Springer book series Lecture Notes in Networks and Systems (LNNS), ensuring worldwide visibility. LNNS is indexed in renowned databases such as SCOPUS, DBLP, and INSPEC.
  • Collaborate with Experts: Network with leading researchers and industry professionals in cutting-edge fields, including:
    • Advanced Engineering
    • Power Systems
    • Technology Applications
Important Dates
  • Paper Submission Deadline: May 10, 2025
  • Registration Deadline: June 30, 2025
How to Submit?
Visit www.icaeta.com for detailed submission guidelines and requirements. For any inquiries, reach out to us at info@icaeta.com” target=”_blank”> info@icaeta.com.
Join ICAETA 2025 and be part of a transformative event shaping the future of advanced engineering and technology applications!
Warm regards,
Shallena Akbar
Conference Secretary
Design by 2b Consult