CST Future Events

The 6th International Workshop on Applications - ACE-2022

The 6th International Workshop on

Applications of AI, Cyber Security and Economics Big Data (ACE-2022)

In conjunction with

The 7th IEEE International Congress on Cyber Science and Technology (CyberSciTech 2022)

Calabria University, Italy, 12-15, September 2022 cyber-science.org/2022

Subject and Objectives

This international workshop provides a platform for IT experts and young researchers to present their Cyber related original research discoveries updates. The workshop period is an opportunity to network with top researchers in the world to exchange ideas, intrigue more creativity, as well as to obtain fore-view and guidance for further explorations of Cyber space. The ACE workshop was held first with IEEE 2017 CyberSciTech in Orlando, USA, then held in Exeter, UK in 2018, in Leicester, UK in 2019. And online in 2020 and 2021, ACE 2022 is the 6th edition with focus on innovative applications of AI, cyber security and big data as well as their integrations.

Scope and Topics

This physical workshop is broad in scope and invites original research contributions on topics that include, but are not limited to the following:

  • AI and Artificial Intelligence Applications
  • Smart City, AV and 5G/6G Technology
  • Big Data Process, Information Retrieval & Data Sciences Applications
  • Digital Forensics, Information Security and Cybersecurity
  • Edge Computing, Hyper Intelligence and IoT Applications
  • Blockchain and Decentralised Ledgers
  • Cryptography and Steganography.
  • Cyber Economy and Finance
  • Cyber-Stalking Cyber-Bullying and Computer Law
  • Data Analytics and Protection, Security Monitoring and Analysis
Submission and Publication

Authors should submit a paper of up to 6 pages of their original work. Submitted papers need to abide by IEEE Computer Society formats, and must be formatted accordingly.


All submissions will be made through CyberSciTech 2022 EDAS system website cyber-science.org/2022

The 7th CyberSciTech, The 6th International Workshop on Applications of AI, Cyber Security and Economics Big Data (ACE2022).

All the accepted papers must be presented in the workshop during and will also be included in the IEEE CyberSciTech proceedings, which will be published by IEEE CPS (EI indexed, in IEEE DL).

Important Dates
  • Submission Due: June 15, 2022
  • Author Notification Due: July 1, 2022
  • Final Camera-ready Submission: July 15, 2022
Organising Committee

General Chair

General Co-Chairs

Executive Chair

Advisory Chairs

  • Wenbin Zhao, Cleveland State University, USA
  • Emrouznejad, Aston University, UK

Program Committee Chairs

  • Xu, University of Foreign Affairs, China,
  • Min, University of Exeter, UK

Publicity Chair

Program Committee

  • Yang, Northumbria University, UK
  • Dong, Strathclyde University, UK
  • Conrad, University of Bedfordshire, UK
  • Sun, Nanjing University of Posts and Telecommunications, China

Sponsored by IEEE Computer Society and Supported by:

  • IEEE Tcsc
  • IEEE HiTc
  • IEEE Italy Section
  • Italy Section SYSC Chapter
  • Italy Section VT/COM Joint Chapter
  • Italy Section CS Chapter
  • Italy Section SEN Chapter and
  • University Della Calabria, ICAR.

Cybersecurity Club @ UoB

IBM Z Xplore (formally called Master The Mainframe)

This year's competition started in October 2021. CST students are encouraged to attempt this series of tasks and where possible to complete them all.

Please see IBM Z Xplore | IBM for more information and to sign-in for the competition please see, IBM Z Xplore (influitive.com) 

Good Luck!

Dr Ali Mansour

Geraint Williams

BCS  - University of Bedfordshire Student Chapter

Weaponised PDFs Masterclass

Postponed - New date and time to be announced soon!

Guest Speaker: Geraint Williams, Chief Information Security Officer (CISO) at GRC International Group

Following the interest of the audience and success of Geraint Williams’s talk on Thursday 29 November on Weaponised PDFs, Geraint is planning to hold a full-day Weaponised PDFs workshop/masterclass on Saturday 19 January.Geraint Williams

The Weaponised PDFs Masterclass is still in the planning stages, and more details will be available shortly. It is proposed that during the Masterclass attendees will undertake the following:

  • Create their own weaponised PDF using a variety of techniques
  • Test their PDF on a target
  • Reverse engineer weaponised PDF that are in the wild

The masterclass will be kept as practical as possible. Attendees will have to work through a review following the presenter’s instructions and a worksheet on their virtual machines before undertaking practical work by themselves either in pairs or small groups.

A booklet will be provided that will not only have the worksheets for the review and guidance notes for the practical work but also details on the methodology, techniques and tools that can be used.

Attendees are expected to be familiar with Windows and Linux GUI and command line environments. Having knowledge of Kali and Metasploit would be advantageous.

About Geraint Williams:

“I have previously taught Information Security, Ethical Hacking and Digital forensics at the University of Bedfordshire and since then have been a Payment Card Industry Qualified Security Assessor and consultant and have worked with breached companies along with household names to ensure they meet the minimum security requirement to protect cardholder data. I have also worked as an Ethical Hacker and Information security consultant but now the Chief Information Security Officer for GRC International Group.

I am passionate about continued learning and being an evangelist for information security. My interests include electronics as well as computing and been known to turn Arduino and Raspberry Pi’s into hacking tools.”

Geraint is an extremely knowledgeable and experienced Information Security consultant with experience including vulnerability testing, digital forensics, secure networking, and wireless security issues. He has a strong technical knowledge of security and IT infrastructure including high performance computing. Geraint has a number of certifications in security and digital forensics including CISSP, CISA, CEH and CHFI.

This event is being organised by the University of Bedfordshire CST School together with the BCS Student Chapter / Beds Computing SU Society


University switchboard
During office hours
(Monday-Friday 08:30-17:00)
+44 (0)1234 400 400

Outside office hours
(Campus Watch)
+44 (0)1582 74 39 89



International office

Student support


Our Tweets: @uniofbeds