Skip to main content
Dorsett Hotel, Putrajaya
Conference: 1–3 September 2026

About CRC 2026

CRC 2026 is co-organized by Cyber Security Academia Malaysia (CSAM), Institut Keselamatan Awam Malaysia (IPSOM), Ministry of Home Affairs, Universiti Sains Islam Malaysia (USIM), and the Centre for Cyber Security, Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia (UKM). The conference convenes leaders from academia, industry, and government to advance cyber resilience across ASEAN and beyond.

Hybrid 3 Tracks

Theme: Navigating Challenges and Opportunities in Global Cyber Resilience

Important Dates

Submission Deadline
30 June 2026
Acceptance
10 August 2026
Camera Ready
20 August 2026
Registration
10–21 August 2026
Conference: 1–3 September 2026
Call for Papers Open

Call for Papers!

The 6th International Cyber Resilience Conference (CRC 2026) invites original, high-quality research papers that advance the theory and practice of cyber resilience, cybersecurity, and cybercrime mitigation.

We welcome theoretical contributions, methodological advances, applied research, case studies, and real-world deployment experiences across our three main tracks.

Includes guidelines & detailed tracks

Publication

Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

Furthermore, selected papers will be invited to submit full paper for publication in a journal:

  1. Asia Pacific Journal of Information Technology and Multimedia (APJITM) - Scopus Indexed
  2. Malaysian Journal of Cyber Security Application (MJCA)
  3. Malaysia Journal of Information Communication and Technology (MyJICT) - MyCite Indexed

Final Camera-Ready Submission

All authors are required to follow the IEEE format under ‘Camera-Ready Submission Guidelines’. Failure to comply may cause your paper to be excluded from the publication.

  • Prospective authors must comply with the IEEE instructions that can be found in the IEEE conference proceedings templates for Microsoft Word or LaTeX format at the IEEE website.
  • The length of a paper is strictly a minimum of 4 pages and the maximum is not exceeding 6 pages with double-column.
  • Click here for CRC 2026 article template.
PDF Instructions for Authors - After accepted

Reviewer has made some comments please revise your paper, complete registration and prepare camera-ready paper in strict accordance with the IEEE conference template and generate the final PDF using IEEE PDF express (CONFERENCE ID: <to be announced>). The formatting guidelines and submission instructions are available on the conference website. Once the final version is ready:

  1. Upload your IEEE PDF eXpress-compliant file to EasyChair.
  2. Email the proof of registration to icrcsecretariat@csam.my.
  • Camera-Ready Submission Deadline: 20 August 2026
  • Author Registration Deadline: 21 August 2026

For conference payment, click here.

For conference registration, click here.

Please note that at least one author must register and present the paper at the conference for it to be included in the final proceedings and submitted to IEEE Xplore.

We thank you for your valuable contribution and look forward to your participation in CRC 2026.

Conference Tracks

Track 1: Cyber Crime
  • Cybercrime typologies, trends, and threat landscapes
  • Organized cybercrime, cybercriminal ecosystems, and underground markets
  • Financial cybercrime: online fraud, ransomware, crypto-related crime, cross-border crypto laundering
  • Dark web intelligence and monitoring, drug trafficking digitization
  • Digital forensics: memory, network, mobile, cloud forensics and malware-as-a-Service (MaaS)
  • Online harassment, cyberstalking, and technology-facilitated abuse
  • Cybercrime fusion centre
  • Legal, regulatory, and responsible AI in law enforcement and policy frameworks for cybercrime
  • International cooperation and cross-border cybercrime investigation and coordination
  • Child online safety and cybercrime prevention
  • AI-generated cyber crime (deepfakes, synthetic media misuse, scam automation)
  • Measuring cybercrime impact and socio-economic consequences
  • Cyber terrorism, information warfare and online radicalisation & extremism
  • Cyber psychology, human-centered cybercrime, cybercrime awareness and strategies
Track 2: Cybersecurity
  • Network security, SDN/NFV security, and secure routing
  • Cloud, edge, and fog computing security
  • IoT, IIoT, and cyber-physical systems security
  • Mobile, vehicular (V2X), and UAV network security
  • Privacy-preserving computation and secure data sharing
  • Intrusion detection, SIEM, SOAR, and threat intelligence platforms
  • Identity, authentication, access control, and IAM systems
  • Secure software development lifecycle (SSDLC) and DevSecOps
  • Vulnerability assessment, penetration testing, and risk management
  • Security of AI systems and adversarial machine learning
  • Secure communications in 5G/6G and beyond
  • Cryptographic protocols and secure key management
  • Insider threat detection and mitigation
  • Security metrics, benchmarking, and assurance
  • Compliance, standards, and governance (e.g., NIST, ISO 27001)
  • Digital privacy, surveillance, and ethical security design
  • Secure healthcare, fintech, and smart grid systems
Track 3: Emerging Technologies for Secure and Resilient Cyberspace
  • Blockchain, Web3 security, and decentralized identity (DID)
  • Post-quantum cryptography and quantum-safe security architectures
  • Zero-trust security models and resilient system architectures
  • Cyber resilience engineering and self-healing systems
  • Secure digital twins for infrastructure and smart environments
  • Hardware security: TEEs, secure enclaves, PUFs, and TPMs
  • Privacy-enhancing technologies (PETs): MPC, HE, ZKPs
  • Federated learning and privacy-preserving collaborative AI
  • Autonomous cybersecurity and AI-driven defense systems
  • Secure edge intelligence and trustworthy AI deployment
  • Security for metaverse, XR, and immersive environments
  • Bio-inspired and adaptive security mechanisms
  • Resilient architectures for space, satellite, and non-terrestrial networks
  • Trust management and reputation systems in decentralized platforms
  • Green cybersecurity: energy-efficient and sustainable security solutions
  • Human-centric resilience and usable security in emerging systems

Workshops

CSAM CRW

Incident Response and Cyber Threat Intelligence 🛡️

A Workshop for Leaders Working on 🇲🇾 Cybercrime Response 🇲🇾

Objective: To develop the Malaysia’s Cyber Enabled Crime (CEC) Incident Response Model/Guideline.

Date & Time
18 May 2026 (Hybrid) & 19 May 2026 (Online)
9:00 am - 5:15 pm
Venue
Majestic Hotel, Kuala Lumpur
Participants
  • F2F (30 pax): 15-PDRM, 5-IPSOM, 10-CSAM/NACSA
  • Online (20 pax): CSAM Members
  • Note: Organizer's confirmation of physical participants will be communicated through email.
Sponsors & Delivery
CSAM members, senior police officers, and regulators associated with the CCFC initiative. Delivered by the University of Melbourne and Security Associates, on behalf of the University of Melbourne research team, whose work was sponsored by the Australian Government (DFAT1) and supported by NACSA.
Prof. Atif Ahmad

Prof. Atif Ahmad

University of Melbourne

Lead Facilitator

Module Highlights

  • Cybersecurity Introduction
  • The Threat Landscape
  • Cyber Incident Response
  • Cyber Crime in Malaysia
  • CTI in Organizations
  • Opening & Closing Scenarios

Workshop Facilitators

Assoc. Prof. Dr. Umi Asma` Binti Mokhtar
Assoc. Prof. Dr. Umi Asma` Binti Mokhtar
Assoc. Prof. Dr. Khairul Akram Zainal Ariffin
Assoc. Prof. Dr. Khairul Akram Zainal Ariffin
Prof. Dr. Zarina Binti Shukur
Prof. Dr. Zarina Binti Shukur
Prof. Dr. Rozilawati Binti Razali
Prof. Dr. Rozilawati Binti Razali
Prof. Dr. Siti Norul Huda Bt. Sheikh Abdullah
Prof. Dr. Siti Norul Huda Bt. Sheikh Abdullah

Proposed Keynote and Invited Speakers

IG Dato’ Sri Mohd Khalid Bin Haji Ismail
IG Dato’ Sri Mohd Khalid Bin Haji Ismail
Inspector General of Police of Malaysia
Title: From Scam Response to Strategic Cybercrime Command Centre: The Bukit Aman Vision
YBhg. Datuk Hj Makhzan bin Mahyuddin
YBhg. Datuk Hj Makhzan bin Mahyuddin
Division Secretary for the Information Technology Management Division
Title: Securing the Digital Spine of Government: System Integration for Cybercrime Disruption
Prof. Ts. Dr. Shukor bin Abd Razak
Prof. Ts. Dr. Shukor bin Abd Razak
Deputy Vice-Chancellor (Research & Innovation), UniSZA & IEEE Malaysia Section
Title: Emerging Cyber-Enabled Crime versus Cyber-Dependent Crime
Prof. Nathan Clarke
Prof. Nathan Clarke
University of Plymouth
Title: Generalized Age Feature Extraction Coupled with Cyber Security & Forensics Readiness
Assoc. Prof. Dr. Masnizah Mohd
Assoc. Prof. Dr. Masnizah Mohd
Universiti Kebangsaan Malaysia
Title: National Profiling & Mitigation Cyber Sentiment Analysis Strategies
Prof. Lam Kwok Yan
Prof. Lam Kwok Yan
NTU Singapore
Title: Mobile Transactions Mitigating Anti-Money Laundering Strategies
Ts. Tahrizi Tahreb
Ts. Tahrizi Tahreb
Chief Security Officer of Bank Rakyat
Title: Cybercrime Fusion Center: Shaping National Strategic Directions

Conference Fees

Category Type Fee
IEEE Member Local presenter RM 1500
International presenter USD 500
Local student presenter RM 1500
International student presenter USD 350
Non‑IEEE Member Local presenter RM 1800
International presenter USD 700
Local student presenter RM 1800
International student presenter USD 450
Local participant RM 300
International participant USD 100
2nd additional paper (International) USD 330
2nd additional paper (Local) RM 1300

Organising & International Committees

Organising Committee
General Chair
  • Prof Ts. Dr Ainuddin Wahid Bin Abdul Wahab (UM)
General Co-Chair
  • Prof Dr Siti Norul Huda Sheikh Abdullah (UKM)
Secretary Heads
  • Dr. Cik Feresa Binti Mohd Foozy
  • Ts. Dr Nur Hanis Sabrina Suhaimi
Programme Head
  • Prof Ts. Dr Madihah Mohd Saudi (USIM)
Technical Programme Head
  • Assoc. Prof Ts. Dr. Norziana Jamil
Publication Head
  • Assoc. Professor Dr Muhammad Kamrul Hasan (UKM)
Network and Collaboration Heads
  • Dr Ji-Jian Chin (University of Plymouth)
  • Prof Dr Rosilah Hassan (UKM)
Publicity Heads
  • Dr Khoo Li Jing
  • Assoc. Prof Dr. Khairul Akram Zainal Ariffin (UKM)
  • Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at (UM)
Treasury Heads
  • Ts. Dr. Muhammad Faiz Bin Mohd Zaki (UM)
  • Ts. Dr Ahmad Firdaus Bin Zainal Abidin, (UMPSA)
Logistics Heads
  • Dr. Noormadinah Allias
Registration Heads
  • Dr. Fakariah Hani Mohd Ali (UITM)
  • Dr Nurlida (UITM)
  • Ts Dr Saidatul Izyanie Kamarudin (UITM)
  • Ts Dr Norkhushaini Awang (UITM)
Protocol Heads
  • Ts. Dr Nazhatul Hafizah Binti Kamarudin (UKM)
  • Dr Rossilawati Sulaiman (UKM)
Track Heads
  • Track 1 (Cyber Crime): Prof Ts. Dr Madihah Mohd Saudi (USiM)
  • Track 2 (Cybersecurity): Assoc. Prof Dr Muhammad Kamrul Hasan (UKM)
  • Track 3 (Emerging Technologies for Secure & Resilient Cyberspace): Dr Faizan Qamar (UKM)
Steering Committee
  • Prof. Dr. Ainuddin Wahid Bin Abdul Wahab (UM)
  • rof. Ts. Dr. Nor Badrul Anuar Bin Juma'at (UM)
  • Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at (UM)
  • Prof. Ts. Dr. Madihah Mohd Saudi (USIM)
  • Prof. Ts. Dr. Omar Zakaria (UPNM)
  • Prof. Ts. Dr. Shukor Bin Abd Razak (UniSZA)
  • Prof. Ts. Dr. Rabiah Binti Ahmad, FASc (UTHM)
  • Prof. Dr. Zarina Shukor (UKM)
  • Prof. Dr. Rosilah Hassan (UKM)
  • Prof. Madya Dr. Azah Anir Norman (UM)
  • Prof. Madya Dr. Khairul Akram Zainol Ariffin (UKM)
  • Prof. Madya Dr. Muhammad Kamrul Hasan (UKM)
  • Prof. Madya Dr. Umi Asma` Mokhtar (UKM)
  • Prof. Madya Dr. Nurul Nuha Abdul Molok (UIAM)
  • Prof. Madya Dr. Johari bin Abdullah (UNIMAS)
  • Prof. Madya Ts. Dr. Mohamad Fadli Zolkipli (UUM)
  • Prof. Madya Dr. Nurlida Basir (USIM)
  • Ts. Dr. Nur Hanis Sabrina Suhaimi (UKM)
  • Ts. Dr. Abdul Ghafar Jaafar (UTM)
  • Ts. Dr. Mohd Fairuz Iskandar Othman (UTeM)
  • Ts. Dr. S.M. Warusia Mohamed Bin S.M.M Yassin (UTeM)
  • Ts. Tajul Azhar bin Mohd Tajul Ariffin (PUO)
  • Dr. Muhammad Faiz Mohd Zaki (UM)
  • Dr. Nor Masri Sahri (UiTM)
  • Dr. Noormadinah Allias (UiTM)
  • Dr. Shuhaili Talib (UIAM)
  • Dr. Cik Feresa Binti Mohd Foozy (UTHM)
  • Dr. Nazhatul Hafizah Kamarudin (UKM)
  • Dr. Faizan Qamar (UKM)
  • Dr. Khoo Li Jing (University of Wollongong Malaysia)
  • Dr. Rossilawati Sulaiman (UKM)
  • Dr. Shafiza Mohd Shariff (UiTM)
  • Dr. Yumn Suhayla Yusoff (USIM)
International Committee
  • International Committee Head: Dr. Nor Masri Sahri (UiTM)
  • Prof. Dr. Ainuddin Wahid Bin Abdul Wahab (UM)
  • Prof. Ts. Dr. Nor Badrul Anuar Bin Juma'at (UM)
  • Prof. Md. Abdur Razzaque, University of Dhaka, Bangladesh
  • Prof. Hardik Goel, University of Houston–Victoria, Texas, USA
  • Prof. Keith Martin, Information Security, Royal Holloway, UK
  • Prof. Gautam Srivastava, Brandon University, Canada
  • Prof. Hadis Karimipour, University of Calgary, Canada
  • Prof. Md. Arafatur Rahman, University of Wolverhampton, United Kingdom
  • Prof. Weishan Zhang, University of Petroleum (East China), Qingdao, China
  • Prof. Thippa Reddy Gadekallu, Zhejiang A&F University, Hangzhou 311300, China
  • Professor Marcos Faundez Zanuy, Pompeu Fabra University (UPF), Mataro, Spain
  • Prof. John Kamau, Mount Kenya University, Kenya
  • Prof. Amir Hussain, University of Oxford, UK
  • Prof. Bishwajeet Pandey, GL Bajaj Institute of Technology and Management, India
  • Prof. Suman Pandey, Gwangju Institute of Science and Technology, Korea
  • Prof. Dr. Atif Ahmad, University of Melbourne
  • Prof. Dr. Bogdan Ghita, University of Plymouth
  • Prof. Dr. Jenny Zhang, RMIT University
  • Prof. Dr. Kangbin Yim, Soonchunhyang University
  • Prof. Dr. Liu Yuling, Hunan University, China
  • Prof. Dr. Miss Laiha Mat Kiah, Universiti Malaya
  • Prof. Dr. Siti Norul Huda Sheikh Abdullah, Universiti Kebangsaan Malaysia
  • Prof. (Dr.) Madhu Sharma Gaur, GL Bajaj Institute of Technology and Management, India
  • Prof. Chiroma Haruna, Haifar Al Bath Uni, Saudi Arabia
  • Prof. Md. Sarwar Hossain, Pubna University of Science and Technology, Bangladesh
  • Prof. Nor Shahriza Abdul Karim, Prince Sultan University, Riyadh, Saudi Arabia
  • Prof. Rajesh Kumar Dhanaraj, Symbiosis International (Deemed University), Pune, India
  • Prof. Rashid A Saeed, Lusail University, Qatar
  • Prof. Shabkib Hakak, New Brunswick University, Canada
  • Prof. Yousef Farhaoui, Muhammad V University, Morocco
  • Prof Chakchai So-In, Khon Kaen University
  • Prof. Dr. S. B. Goyal, Chitkara University, Punjab, INDIA
  • ⁠Prof. Bilal Bataineh, Philadelphia University, Jordan
  • Prof Dr Yoanes Bandung, Institute Technology Bandung (ITB), Indonesia
  • Assistant Prof. Dr. Riyadh Rahef Nuiaa Alogaili
  • Assoc Prof. Dr. Anwar Hassan Ibrahim. Qassim University, Saudi Arabia
  • Assoc. Prof. Dr. Atheer Bassel, University of Anbar, Iraq
  • Assoc. Prof. Dr. Dheeb Albashish, Al-Ahliyya Amman University, Jordan
  • Assoc. Prof. Dr. Mohiuddin Ahmed, Adelaide University
  • Assoc. Prof. Dr. Norziana Jamil, United Arab Emirates University
  • Assoc. Prof. Dr. Taj-Aldeen Naser Abdali, University of Misan, Iraq
  • Assoc. Prof. Dr. Tarik Abu-Ain, Saudi Electronic University, KSA
  • Assoc. Prof. Dr. Tutut Herawan, Universiti Malaya
  • Assoc. Prof. Dr. Waleed Abdelkarim Abuain, Taibah University, KSA
  • Assoc. Prof. Dr. Zaid Alyasseri, ITRDC, University of Kufa, Iraq
  • Assoc. Prof. Mohamad Khairi Ishak, University of Sharjah, UAE
  • Assoc. Prof. Dr. Rahmad Kurniawan, Universitas Riau, Indonesia
  • Dr. Muhammad Attique Khan, Center of AI, Prince Mohammad bin Fahd University, Alkhobar, Saudi Arabia
  • Dr. Lubna Luxmi Dhirani, University of Limerick, Ireland
  • Dr. Weiwei Jiang, Beijing University of Posts and Telecommunications, China
  • Dr. Rutvij H. Jhaveri, Pandit Deendayal Energy University, India
  • Dr. Hussam Al Hamadi, Dubai University, United Arab Emirates
  • Dr. Inam Ullah, Gachon University, Korea
  • Dr. Abdelbasset Azzouz, Saida University, Algeria
  • Dr. Abdulatif Alabdultif, Qassim University, Saudi Arabia
  • Dr. Ahmed Hadi Ali AL-Jumaili, University of Fallujah, Anbar, Iraq
  • Dr. Ali Nouman, Yeungnam University, Republic of Korea
  • Dr. Amjed Abbas Ahmad, Imam Al-Kadhum University College
  • Dr. Amjed Sid Ahmed Mohamed, Global College of Engineering and Technology, Oman
  • Dr. Ashwaq Qasem, Xiamen University Malaysia
  • Dr. Bahera Hani Nayef, Al Nahrain University, Baghdad, Iraq
  • Dr. Bedir Yılmaz, LCM Digital, Germany
  • Dr. Dk Hayati Pg Hj Mohd Yassin, Universiti Brunei Darussalam
  • Dr. Fadele Ayotunde Alaba, Zaria Uni, Nigeria
  • Dr. Farshid Pirahansiah, AMERIA AG, Heidelberg, Germany
  • Dr. Guntha Karthik, Stanley College of Engineering and Technology for Women, India
  • Dr. Hai-Van Dang, University of Plymouth
  • Dr. Hamza Bali, University of Adelaide, Australia
  • Dr. Izyani Ahmad, Kolej Komuniti Jelebu
  • Dr. Jawad Ahmad, Prince Mohammad Bin Fahd University, Saudi Arabia
  • Dr. Je Sen Teh, Deakin University
  • Dr. Ji-Jian Chin, University of Plymouth
  • Dr. Khaleel Ahmad, Maulana Azad National Urdu University, India
  • Dr. Lizhuang Tan, Qilu University of Technology, China
  • Dr. Manar Mizher, Al al-Bayt University
  • Dr. Mousa’b Mohammad Shtayat, Philadelphia University, Amman, Jordan
  • Dr. Muhamad Irsan, Telkom University, Bandung, Indonesia
  • Dr. Muhammad Ali Fauzi, Universitas Brawijaya Malang, Indonesia
  • Dr. Muhammad Nuruddin bin Sudin, USIM
  • Dr. Nader Sohrabi Safa, University of Worcester, UK
  • Dr. Rahmad Abdillah, Universitas Islam Negeri Sultan Syarif Kasim Riau
  • Dr. Samar Kamil, Al‑Mansour University College, Iraq
  • Dr. Sitti Rachmawati Yahya, Universitas Siber Asia, Jakarta
  • Dr. Soumi Dutta, Sister Nivedita University, India
  • Dr. Sunil Prajapat, Marwadi University, India
  • Dr. Wencheng Yang, University of Southern Queensland, Australia
  • Dr Hanane Lamaazi, UAE University
  • Dr. Aamir Z. Shaikh, NED University of Engineering and Technology, Pakistan
  • Dr. Ali Nauman, Yeungnam University, Republic of Korea
  • Dr Nickson M. Karie, Curtin University, Western Australia
  • Kapt. Ts. Dr. Muhamad Lazim bin Talib, Universiti Pertahanan Nasional Malaysia
  • Md. Riad Hassan, Green University of Bangladesh
  • Ashok Kumar Kanagala, Snap Finance, Massachusetts, USA
  • Assoc Prof Dr. Erick Fernando, Universitas Multimedia Nusantara
  • Dr Nurul Halimatul Asmak Ismail, Princess Nourah bint Abdulrahman University

Strategic Partners & Co‑Sponsors

Contact Information

Conference Email: crcsecretariat@csam.my

Conference Website: https://www.csam.my/crc2026/

Address:
Research Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600.

Conference Venue

Dorsett Hotel, Putrajaya

A modern and elegant hotel located in the heart of Malaysia's federal administrative capital, offering stunning views and world-class amenities.

Official Website

3, Jalan Tun Abdul Razak, Presint 3, 62000 Putrajaya, Malaysia

Visit Malaysia 2026 Logo