The papers and ideas to be discussed in this conference aim to cover the following aspects of Information Security but not limited to:
1. Cryptology and Network Security
(Classical, Quantum and Post-Quantum Cryptography)
- Access Control
- Anonymity & Pseudonymity
- Applied Cryptography
- Attacks & Malicious Code
- Authentication, Identification
- Block & Stream Ciphers
- Blockchain Security and Privacy
- Cryptographic Algorithms and Primitivess
- Cryptographic Protocols
- Cyberphysical Security
- Denial of Service Protection
- Embedded System Security
- Formal Methods for Security
- Hash Functions
- Key Management Security Algorithms
- Intrusion Detection System (IDS)
- Honeypot
- Virus Issues (Detection, Prevention ...)
- Security for software-defined and data center networks
- Mobile /5G Network Security
- Security in Internet of Things
- Security in CDN (Contents Distribution Networks)
- Virtual Private Network (VPN)
- Tracing Techniques in Internet
- Active Networks
- Security in Grid
- Web Monitoring
- Control Systems/SCADA Security
- Network Security Engineering
- Transport-Level Security
- Wireless Network Security
- IP Security
- Electronic Mail security
- Firewall Systems
- Hacking Techniques and Related Issues
- Trusted Computing
- Alert Correlation
- Attack Graphs
- Incident Responding
- Malware Analysis
- Intrusion Detection
- Cryptographic Processors and Co-Processors
- Security Architectures
- True and Pseudorandom Number Generators
- Side Channel Attacks
- Fault Attacks
- Applications Using or Built on Top of Bitcoin
- Bitcoin Protocol and Extensions
- Blockchain Applications
2. Cyber and Digital Forensics
- Cyber-risk management
- Evidentiary Aspects of Digital Forensics
- Face Recognition Systems
- Signature Recognition Systems
- Forensic Analysis
- Digital Currency
- Anti-Forensics and Anti-Anti-Forensics Techniques
- Data leakage, Data protection and Database forensics
- Executable Content and Content Filtering
- Forensics of Virtual and Cloud Environments
- Emails mining & authorship identification
- Investigation of Insider Attacks
- Behavioral biometrics
- Malware forensics and Anti-Malware techniques
- Biometric Technologies for Security
- Feature Extraction and Matching Algorithms
- Green digital forensics and cyber investigation
- Privacy, security and trust in social media
- Content protection and digital rights management
- Identity and trust management
- Security of embedded systems
- Performance evaluation of biometric systems
- Tools for cyber and digital forensics
- Block-chain technologies
- Privacy exposures and violations
- Balancing digital investigations with privacy concerns
- Collaboration models between government, industry and/or academia
- Authorized access to encrypted information for forensic purpose
- Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics
- Sustainable cyber threat intelligence in IoT, smart grids, and modern networks
3. Software Security, Reliability and Assurance
- Secure software design/architecture
- Secure software practices
- Security in requirements engineering
- Security analysis tools and methods
- Security-Savvy Software Development
- Security evaluation criteria and methodology
- Benchmark, Tools, Industrial Applications, and Empirical Studies
- Vulnerability, threat, and risk analysis
- Metrics, Measurements, and Analysis
- Obfuscation and software security
- Usability of secure/security software
- Security awareness for software developers
(Reliability, Security, Availability, and Safety of Software Systems)
- Formal Methods
- Program Debugging and Comprehension
- Security in Testing, Verification, and Validation
- Fault Tolerance for Software Reliability Improvement
- Information and Software Quality Assurance
- Modeling, Prediction, Simulation, and Evaluation
4. Security, Privacy and Trust in Modern Data Management
- Data Encryption
- Data Privacy
- Data Security
- Data hiding and watermarking
- Cloud and big data security
- Digital right management and data protection
- Database security
- Mobile App Privacy & Security
- Web trust
- Trust in crowdsourcing
- SLM oriented Trust
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Data and Computation Integrity
- Identity and Trust Management
- Information Assurance
- Information Filtering
- Privacy Enhancing Technologies
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Social Networks
- Big Data Management
- Cloud Systems
5. Intelligent Secure Systems
Soft computing algorithms and technologies applied to:
- Cyber Security
- Distributed and cooperative security solutions
- Autonomous key management
- Identity management
- Military deployable applications
- Threat forecasting
- Fraud detection
- Attack prevention
- Secure routing
- Self-optimization techniques in wireless network security
- Anomaly detection
- Soft security mechanisms
- Trust analysis/measurement
- Robustness and survivability
- Bio-inspiring system in cyber security
- Agent-based security architecture
- Cloud computing security and privacy
- Automated vulnerability assessment
- Biometric identification and authentication
- Biometric identifiers based on physiological, behavioural and other characteristics
- Bio-enabled multi-factor authentication
- Privacy in biometrics