The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
International Conference on Cyber Threat Intelligence
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Cyber Threat Intelligence.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Cyber Threat Intelligence.
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Cyber Threat Intelligence are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
20. International Conference on Cyber Threat Intelligence has teamed up with the Special Journal Issue on
Cyber Threat Intelligence.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
The Impact of the Knowledge-Sharing Factors on Improving Decision-Making at Sultan Qaboos University Libraries
Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi
-
Online Think–Pair–Share in a Third-Age ICT Course
Daniele Traversaro
-
Using Social Network Analysis for Cyber Threat Intelligence
Vasileios Anastopoulos
-
CybeRisk Management in Banks: An Italian Case Study
E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini
-
A Research on Determining the Viability of a Job Board Website for Refugees in Kenya
Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu
-
Awareness Level of Green Computing among Computer Users in Kebbi State, Nigeria
A. Mubarak, A. I. Augie
-
Identification of Risks Associated with Process Automation Systems
J. K. Visser, H. T. Malan
-
Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
-
Construction 4.0: The Future of the Construction Industry in South Africa
Temidayo. O. Osunsanmi, Clinton Aigbavboa, Ayodeji Oke
-
A Multi-Science Study of Modern Synergetic War and Its Information Security Component
Alexander G. Yushchenko
-
Lack of BIM Training: Investigating Practical Solutions for the State of Kuwait
Noor M. Abdulfattah, Ahmed M. Khalafallah, Nabil A. Kartam
-
Integrating Generic Skills into Disciplinary Curricula
Sitalakshmi Venkatraman, Fiona Wahr, Anthony de Souza-Daw, Samuel Kaspi
-
Use of Information Technology in the Government of a State
Pavel E. Golosov, Vladimir I. Gorelov, Oksana L. Karelova
-
Pallet Tracking and Cost Optimization of the Flow of Goods in Logistics Operations by Serial Shipping Container Code
Dominika Crnjac Milic, Martina Martinovic, Vladimir Simovic
-
The Study of Internship Performances: Comparison of Information Technology Interns towards Students’ Types and Background Profiles
Shutchapol Chopvitayakun
Conference venue information will be released soon.
Cyber threat intelligence (CTI)
Techniques for attribution and tracing of actor evolution
Methods of expose attack infrastructure and derive TTPs
Methods and results in campaign analysis
Mining of Open Source Intelligence and Social Media Intelligence
Strategies for secure threat intelligence sharing and interchange of CTI information
Evaluation of CTI information and integration of CTI sources
Application of CTI in context and TI life cycle
Abstracts/Full-Text Paper Submission Deadline |
|
February 13, 2025 |
Notification of Acceptance/Rejection |
|
February 27, 2025 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
May 25, 2026 |
Conference Dates |
|
June 24-25, 2026 |