Welcome to CIOS 2026

4th International Conference on Cloud, IoT and Security (CIOS 2026)

May 30 ~ 31, 2026, Virtual Conference

Program Committee

More Details...



Accepted Papers

More Details...



Virtual Conference




Scope 

The 4th International Conference on Cloud, IoT and Security (CIOS 2026) aims to bring together leading researchers, practitioners, and industry experts to share their latest findings, innovations, and insights across the rapidly evolving domains of Cloud Computing, the Internet of Things (IoT) and Cybersecurity. As these fields continue to converge and shape the foundation of modern digital ecosystems, CIOS 2026 provides a premier international forum for presenting cutting edge research, discussing emerging trends, and exploring real world applications.


Registered authors are now able to present their work through our online platforms

Call for Papers


The conference seeks to foster collaboration between academia and industry by offering a platform where theoretical advances, methodological developments, system designs, and practical implementations can be exchanged. Participants will have the opportunity to engage with pioneering work that addresses the challenges and opportunities arising from large scale cloud infrastructures, intelligent IoT systems, and the increasingly complex landscape of security and privacy.


Topics of interest include, but are not limited to, the following


    Cloud Computing, AI Infrastructure and Distributed Systems
  • Cloud Architecture and Platforms
  • Next-Generation Cloud Architectures and Cloud-Native Systems
  • Microservices, Service Mesh and API Ecosystems
  • Serverless Computing and Function-as-a-Service
  • Multi-Cloud, Hybrid Cloud and Cloud Federation
  • Cloud Interoperability, Standards and APIs
  • AI-Driven Cloud and Foundation Model Infrastructure
  • Cloud Infrastructure for LLM Training and Inference
  • Distributed Training Systems (FSDP, ZeRO, MoE, Pipeline Parallelism)
  • GPU/TPU/DPU Scheduling, Multi-Tenant Accelerator Clouds
  • AI Workload Optimization in Data Centers
  • MLOps, Model Serving, Vector Databases and Retrieval Systems
  • Data Center Systems and High-Performance Cloud
  • Disaggregated Infrastructure (Compute/Memory/Storage/Network)
  • CXL-based Memory Pooling and Rack-Scale Computing
  • High-Performance Data Center Networking (RDMA, SmartNICs, DPUs)
  • Cloud for HPC and Scientific Workloads
  • Cloud Operations, Reliability and Sustainability
  • Observability, Monitoring, Telemetry and AIOps
  • Autonomous Cloud Operations and Self-Healing Systems
  • Cloud Performance, Scalability and Reliability Engineering
  • Carbon-Aware Scheduling and Sustainable Cloud Computing
  • Energy-Efficient AI and Green Data Centers
  • Cloud Storage and Data Management
  • Cloud Storage Systems and Disaggregated Storage
  • Big Data Analytics, Real-Time Processing and Stream Systems
  • Data Governance, Data Sovereignty and Compliance
  • Emerging Cloud Technologies
  • Confidential Computing and Trusted Execution Environments
  • Quantum Computing in Cloud Environments
  • Cloud Security Architectures and DevSecOps
  • Internet of Things (IoT), Edge Intelligence and Cyber-Physical Systems
  • IoT and Edge Architectures
  • IoT Protocols, Standards and Interoperability
  • IoT–Edge–Cloud Continuum and Distributed Intelligence
  • Edge AI, TinyML and On-Device Learning
  • AIoT: AI-Enhanced IoT Systems and On-Device Generative AI
  • 6G IoT and Next-Gen Connectivity
  • 5G/6G IoT, URLLC, TSN and LPWAN
  • Integrated Sensing and Communication (ISAC)
  • Reconfigurable Intelligent Surfaces (RIS) for IoT
  • Spectrum Sharing and Next-Gen Wireless for CPS
  • Autonomous and Intelligent CPS
  • Autonomous Edge Systems and Self-Optimizing CPS
  • Robotics, Drones and Autonomous Systems with IoT
  • Real-Time CPS, Safety-Critical IoT and Industrial IoT
  • Digital Twins and Smart Environments
  • Digital Twins for IoT, CPS and Smart Infrastructure
  • Smart Cities, Smart Healthcare, Smart Transportation
  • IoT for Digital Health, Wearables and Bio-IoT
  • IoT Data and Sustainability
  • IoT Data Management, Stream Analytics and Event Processing
  • Sustainable IoT and Green CPS
  • Human–IoT Interaction and Usability
  • Security, Privacy and Trust
  • Cloud, Edge and IoT Security
  • Security and Privacy in Cloud, Edge and IoT Ecosystems
  • Zero Trust Architectures, SASE and Secure Access
  • Secure Virtualization, Container Security and Multi-Tenancy
  • IoT Security Frameworks, Lightweight Cryptography and Secure Firmware
  • Hardware Security: TEE, TPM, SGX, SEV, TrustZone
  • AI/ML Security
  • Adversarial Machine Learning and Model Robustness
  • Security of LLMs, AI Agents and Foundation Models
  • AI Supply Chain Security (Dataset Poisoning, Model Extraction, Backdoors)
  • Privacy-Preserving ML: Differential Privacy, MPC, Federated Learning
  • AI for Cyber Defense, Threat Detection and Automated Response
  • Network and System Security
  • Network Security, Wireless Security and 5G/6G Security
  • Intrusion Detection and Prevention (IDS/IPS)
  • Malware Analysis, Threat Intelligence and Incident Response
  • Ransomware, APTs and Nation-State Threats
  • Secure Protocols, Cryptographic Engineering and Key Management
  • Distributed System and P2P Security
  • Blockchain, Cryptography and Trust Technologies
  • Blockchain and Distributed Ledger Security
  • Smart Contract Security and Formal Verification
  • Post-Quantum Cryptography and Quantum-Resistant Systems
  • Decentralized Identity and Trust Management
  • Emerging Security Domains
  • GPU/Accelerator Security and Side-Channel Attacks
  • Deepfake Detection, Synthetic Media Forensics and Misinformation Defense
  • Security of Autonomous Vehicles, Robots and Drones
  • Cybersecurity for Critical Infrastructure (ICS/SCADA, OT Systems)
  • Quantum-Enabled Attacks and Hybrid Security Models
  • Human Centered and Organizational Security
  • Usable Security and Privacy
  • Security Governance, Risk and Compliance
  • Social Engineering, Behavioral Security and Cyber Psychology
  • Cross Cutting Emerging Themes
  • Software Supply Chain Security (SBOM, CI/CD Security)
  • Privacy-Enhancing Technologies (PETs): HE, MPC, DP
  • Ethical AI, AI Governance and Responsible Computing
  • Metaverse, AR/VR Security and IoT Integration
  • Multimodal Systems (Vision + Audio + IoT + Cloud)
  • Resilience Engineering, Chaos Engineering and Disaster Recovery
  • Quantum-Safe Cloud and IoT Systems
  • Autonomous Cloud and Edge Orchestration
  • Global Regulatory Compliance (GDPR, AI Act, Data Sovereignty)

Paper Submission

Authors are invited to submit papers through the conference Submission System by May 02, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).

Important Dates

Third Batch : Submissions after April 21, 2026

Submission Deadline

May 02, 2026

Authors Notification

May 21, 2026

Registration & camera - Ready Paper Due

May 25, 2026

Proceedings

The soft copy of the proceedings will be available on Journal web pages.

The Registration fee is 250 USD for accepted article Authors. Atleast one author of accepted paper is required to register at the full registration rate.

Speakers


Catherine Haliotou
Greece

John Hedlund-Fay
University of Sheffield
United States

Nick Alex
Bauman Moscow State
Technical University
Russia

Jordi Audet Palau
Spain