11th

ICITDA

(International Conference on Information Technology and Digital Applications)

9 - 10 November 2026

Starts in

ICITDA 2026

News / Information

  • February, 10: 2025 IEEE 11th International Conference on Information Technology and Digital Applications (ICITDA) has been published. Check this <<link>>

ICITDA 2026

Important Links

ICITDA 2026

Main Topic

“From Data to Defense: Advancing Cybersecurity Through Intelligence and Automation”

The rapid digital transformation across industries has led to an unprecedented growth in data generation, interconnected systems, and cloud-based infrastructures. While this evolution enhances operational efficiency and innovation, it simultaneously expands the attack surface for cyber threats. Organizations today face increasingly sophisticated adversaries who exploit vulnerabilities using automation, artificial intelligence, and coordinated attack strategies. Traditional rule-based and reactive cybersecurity approaches are no longer sufficient to cope with the scale, speed, and complexity of modern cyberattacks.

One of the primary challenges in contemporary cybersecurity lies in managing and interpreting massive volumes of heterogeneous data generated by networks, endpoints, applications, and users. Security teams are often overwhelmed by alerts, resulting in delayed responses, alert fatigue, and missed critical incidents. Furthermore, advanced persistent threats (APTs), zero-day vulnerabilities, ransomware campaigns, and supply-chain attacks require adaptive and intelligence-driven defense mechanisms rather than static security controls.

The central issue, therefore, is how to transform raw security data into actionable intelligence that supports proactive and automated defense strategies. This transformation requires the integration of data analytics, machine learning, threat intelligence platforms, and security orchestration tools. By leveraging intelligent systems, organizations can identify anomalies, predict potential attack vectors, prioritize risks, and automate incident response processes in real time.

Several research directions emerge from this theme. First, the development of scalable data-driven threat detection models using artificial intelligence and deep learning remains a critical area of investigation. Research may focus on improving detection accuracy, reducing false positives, and enhancing model interpretability. Second, the design of automated security orchestration and response frameworks (SOAR) can significantly reduce response time and operational costs. Third, integrating cyber threat intelligence sharing mechanisms across organizations while preserving privacy and compliance presents both technical and regulatory challenges. Finally, adaptive defense architectures—such as zero trust models and autonomous security systems—offer promising avenues for building resilient cyber infrastructures.

In conclusion, advancing cybersecurity through intelligence and automation is not merely a technological enhancement but a strategic necessity. By converting data into defensive capabilities, researchers and practitioners can move toward predictive, autonomous, and resilient security ecosystems capable of confronting the evolving cyber threat landscape.

The theme emphasizes how data analytics, threat intelligence, artificial intelligence, and machine learning can be leveraged to detect, predict, and mitigate cyber threats in real time. It highlights the integration of security intelligence platforms, automated incident response, behavioral analytics, and adaptive defense architectures to strengthen resilience across networks, cloud systems, and critical infrastructures.

About

Conference Tracks and Topics

  • Artificial Intelligence
  • Big Data
  • Causal Modeling
  • Cloud Computing
  • Computer Graphics and Multimedia
  • Computer Networks
  • Computer Vision
  • Databases
  • Data Science
  • Deep Learning
  • Digital Forensics and Security
  • Educational Technology
  • Human Computer Interaction
  • Information Systems
  • Information Theory
  • Intelligent System
  • Internet of Things (IoT)
  • Machine Learning
  • Medical Informatics
  • Pattern Recognition
  • Soft Computing
  • Software Systems
  • Text Analytics
  • Wireless Communication

Proceedings

Accepted papers will be submitted for inclusion into IEEE Xplore (on process) subject to meeting IEEE Xplore's scope and quality requirements.

 

No-show Policy

All accepted papers must be presented at the conference. ICITDA preserves the right to exclude all accepted papers which are not presented and no-show papers will not be submitted.

TOP PERSONALITIES

Keynote Speakers (TBA)

Check

Important Dates

  • April 30, 2026
  • Submission Deadline
  • June 1, 2026
  • Acceptance Notification
  • June 15, 2026
  • Revision
  • June 30, 2026
  • Camera Ready
  • July 15, 2026
  • Author Registration (Early Bird)
  • October 10, 2026
  • Author Registration
  • November 9-10, 2026
  • Conference Date

GET IN TOUCH

Contact

Organized By:

Universitas Islam Indonesia (Indonesia)

Telephone

+62 274 895287 Ext. 122 (UII)

Venue

Yogyakarta, Indonesia.

Email

icitda@uii.ac.id

informatics@uii.ac.id

Organized by:

uii-logo-biru

Supported by:

Pusfid
Sains Data
SIE simple version
Informatika Medis
LogoITCHitam