CSPS 2025, is an international conference where theory, practices, and applications of Computer Science, Programming and Security and related topics are presented and discussed. Original contributions are solicited on topics covered under broad areas such as (but not limited to):

    Complex systems
    Pipeline processors
    RISC/CISC, VLIW architectures
    High-level language architectures
    Parallel Architectures
    Distributed architectures
    Mobile processors
    Real-time distributed
    Scheduling and task partitioning
    Data communications
    Interprocessor communications
    Network-level security and protection
    Circuit-switching networks
    Distributed networks
    Network communications
    Network topology
    Packet-switching networks
    Wireless communication
    Network Protocols
    Protocol architecture
    Routing protocols
    Public networks
    Distributed Systems
    Client/server
    Distributed applications
    Distributed databases
    Network operating systems
    Local-Area Networks
    Wireless
    Mobile Computing
    Algorithm/protocol design and analysis
    Architectures
    Mobile communication systems
    Mobile environments
    Support services
    Miscellaneous
    Computer System Implementation
    VLSI Systems
    Impact of VLSI on system design
    Web server
    Web browser
    Software/Software Engineering
    Object-Oriented Programming
    Logic Programming
    Visual Programming
    Distributed programming
    Software release management and delivery
    Public key cryptosystems
    Coding and Information Theory
    Data compaction and compression
    Theory of Computation
    Models of Computation
    Design and analysis of algorithms
    Logic and proof
    Models of computation
    Intelligent systems
    Computer security
    Computational complexity
    Lambda calculus and types
    Computer animation
    Machine learning
    Computational linguistics
    Automata, logic and games
    Quantum computer science
    Concurrent algorithms and data structures
    Advanced security
    Internet security
    Cyberwarfare
    Information security
    Mobile security
    Network security
    Application security
    Antivirus software
    Secure coding
    Security by design
    Secure operating systems
    Data-centric security
    Firewall (computing)
    Intrusion detection system
    Intrusion prevention system
    Mobile secure gateway
    Computer protection (countermeasures)
    Security measures

Prospective authors are invited to submit full, original research papers that have not been submitted, published, or are under consideration in any other conference or journal. Submissions must strictly adhere to this originality requirement. Papers should be prepared in electronic format (PDF only) and submitted through the CMT Conference Management System or via email to: 📧 csps.chair@gmail.com