CSPS 2025, is an international conference where theory, practices, and applications of Computer Science, Programming and Security and related topics are presented and discussed. Original contributions are solicited on topics covered under broad areas such as (but not limited to):
-
Complex systems
Pipeline processors
RISC/CISC, VLIW architectures
High-level language architectures
Parallel Architectures
Distributed architectures
Mobile processors
Real-time distributed
Scheduling and task partitioning
Data communications
Interprocessor communications
Network-level security and protection
Circuit-switching networks
Distributed networks
Network communications
Network topology
Packet-switching networks
Wireless communication
Network Protocols
Protocol architecture
Routing protocols
Public networks
Distributed Systems
Client/server
Distributed applications
Distributed databases
Network operating systems
Local-Area Networks
Wireless
Mobile Computing
Algorithm/protocol design and analysis
Architectures
Mobile communication systems
Mobile environments
Support services
Miscellaneous
Computer System Implementation
VLSI Systems
Impact of VLSI on system design
Web server
Web browser
Software/Software Engineering
Object-Oriented Programming
Logic Programming
Visual Programming
Distributed programming
Software release management and delivery
Public key cryptosystems
Coding and Information Theory
Data compaction and compression
Theory of Computation
Models of Computation
Design and analysis of algorithms
Logic and proof
Models of computation
Intelligent systems
Computer security
Computational complexity
Lambda calculus and types
Computer animation
Machine learning
Computational linguistics
Automata, logic and games
Quantum computer science
Concurrent algorithms and data structures
Advanced security
Internet security
Cyberwarfare
Information security
Mobile security
Network security
Application security
Antivirus software
Secure coding
Security by design
Secure operating systems
Data-centric security
Firewall (computing)
Intrusion detection system
Intrusion prevention system
Mobile secure gateway
Computer protection (countermeasures)
Security measures
Prospective authors are invited to submit full, original research papers that have not been submitted, published, or are under consideration in any other conference or journal. Submissions must strictly adhere to this originality requirement. Papers should be prepared in electronic format (PDF only) and submitted through the CMT Conference Management System or via email to: 📧 csps.chair@gmail.com
