Conference Tracks

The papers and ideas to be discussed in this conference aim to cover the following aspects of Information Security but not limited to:

1. Cryptology and Network Security
(Classical, Quantum and Post-Quantum Cryptography)

  • Access Control
  • Anonymity & Pseudonymity
  • Applied Cryptography
  • Attacks & Malicious Code
  • Authentication, Identification
  • Block & Stream Ciphers
  • Blockchain Security and Privacy
  • Cryptographic Algorithms and Primitivess
  • Cryptographic Protocols
  • Cyberphysical Security
  • Denial of Service Protection
  • Embedded System Security
  • Formal Methods for Security
  • Hash Functions
  • Key Management Security Algorithms
  • Intrusion Detection System (IDS)
  • Honeypot
  • Virus Issues (Detection, Prevention ...)
  • Security for software-defined and data center networks
  • Mobile /5G Network Security
  • Security in Internet of Things
  • Security in CDN (Contents Distribution Networks)
  • Virtual Private Network (VPN)
  • Tracing Techniques in Internet
  • Active Networks
  • Security in Grid
  • Web Monitoring
  • Control Systems/SCADA Security
  • Network Security Engineering
  • Transport-Level Security
  • Wireless Network Security
  • IP Security
  • Electronic Mail security
  • Firewall Systems
  • Hacking Techniques and Related Issues
  • Trusted Computing
  • Alert Correlation
  • Attack Graphs
  • Incident Responding
  • Malware Analysis
  • Intrusion Detection
  • Cryptographic Processors and Co-Processors
  • Security Architectures
  • True and Pseudorandom Number Generators
  • Side Channel Attacks
  • Fault Attacks
  • Applications Using or Built on Top of Bitcoin
  • Bitcoin Protocol and Extensions
  • Blockchain Applications

2. Cyber and Digital Forensics

  • Cyber-risk management
  • Evidentiary Aspects of Digital Forensics
  • Face Recognition Systems
  • Signature Recognition Systems
  • Forensic Analysis
  • Digital Currency
  • Anti-Forensics and Anti-Anti-Forensics Techniques
  • Data leakage, Data protection and Database forensics
  • Executable Content and Content Filtering
  • Forensics of Virtual and Cloud Environments
  • Emails mining & authorship identification
  • Investigation of Insider Attacks
  • Behavioral biometrics
  • Malware forensics and Anti-Malware techniques
  • Biometric Technologies for Security
  • Feature Extraction and Matching Algorithms
  • Green digital forensics and cyber investigation
  • Privacy, security and trust in social media
  • Content protection and digital rights management
  • Identity and trust management
  • Security of embedded systems
  • Performance evaluation of biometric systems
  • Tools for cyber and digital forensics
  • Block-chain technologies
  • Privacy exposures and violations
  • Balancing digital investigations with privacy concerns
  • Collaboration models between government, industry and/or academia
  • Authorized access to encrypted information for forensic purpose
  • Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
  • Sustainable cyber threat intelligence in IoT, smart grids, and modern networks

3. Software Security, Reliability and Assurance

  • Secure software design/architecture
  • Secure software practices
  • Security in requirements engineering
  • Security analysis tools and methods
  • Security-Savvy Software Development
  • Security evaluation criteria and methodology
  • Benchmark, Tools, Industrial Applications, and Empirical Studies
  • Vulnerability, threat, and risk analysis
  • Metrics, Measurements, and Analysis
  • Obfuscation and software security
  • Usability of secure/security software
  • Security awareness for software developers (Reliability, Security, Availability, and Safety of Software Systems)
  • Formal Methods
  • Program Debugging and Comprehension
  • Security in Testing, Verification, and Validation
  • Fault Tolerance for Software Reliability Improvement
  • Information and Software Quality Assurance
  • Modeling, Prediction, Simulation, and Evaluation

4. Security, Privacy and Trust in Modern Data Management

  • Data Encryption
  • Data Privacy
  • Data Security
  • Data hiding and watermarking
  • Cloud and big data security
  • Digital right management and data protection
  • Database security
  • Mobile App Privacy & Security
  • Web trust
  • Trust in crowdsourcing
  • SLM oriented Trust
  • Critical Infrastructure (e.g. for Medical or Military Applications)
  • Data and Computation Integrity
  • Identity and Trust Management
  • Information Assurance
  • Information Filtering
  • Privacy Enhancing Technologies
  • Security Policies (Human-Computer Interaction and Human Behavior Impact)
  • Security Measurements
  • Smart Cities
  • Social Networks
  • Big Data Management
  • Cloud Systems

5. Intelligent Secure Systems Soft computing algorithms and technologies applied to:

  • Cyber Security
  • Distributed and cooperative security solutions
  • Autonomous key management
  • Identity management
  • Military deployable applications
  • Threat forecasting
  • Fraud detection
  • Attack prevention
  • Secure routing
  • Self-optimization techniques in wireless network security
  • Anomaly detection
  • Soft security mechanisms
  • Trust analysis/measurement
  • Robustness and survivability
  • Bio-inspiring system in cyber security
  • Agent-based security architecture
  • Cloud computing security and privacy
  • Automated vulnerability assessment
  • Biometric identification and authentication
  • Biometric identifiers based on physiological, behavioural and other characteristics
  • Bio-enabled multi-factor authentication
  • Privacy in biometrics