TOPICS TOPICS LIST

Quantum Cryptography

Networks and infrastructure security

Hardware and systems security

Operating systems and software security

Web, Big data and Cloud security

Distributed systems and data center security

Security and privacy for embedded systems, IoT and Cyber Physical Systems

Information security, data provenance, and information assurance

Prevention, detection and investigation of APTs, DDoS and other cyber attacks

Cryptology, cryptanalysis and security analysis of cryptographic primitives and protocols

Anti-malware techniques: detection, analysis, and prevention

Artificial Intelligence aided security and privacy concerns

(Adversarial) Machine learning and cyber deception

(Anti-) Reverse engineering, side channel attacks and physical attacks

Protection of digital services and applications

Digital forensics, social media, networks, computer and mobile forensics

Automated security analysis of protocols, source code and binaries

Security, Privacy, and Trust in Digital Payments and Crypto currencies

Security and privacy issues in Blockchain

Security, privacy and resilience in critical infrastructures

Testing, auditing and evaluation of security architectures and models

Security issues in 5G Networks and Beyond

Security for future Internet architectures and designs

Measurements and monitoring of human behavior in cyberspace

Interdisciplinary research connecting cyber security and privacy to psychology.

Usable security and privacy: human factors and societal aspects

Cybercrime defense (anti-phishing, anti-blackmailing, anti-fraud, etc.) techniques

Policy making and legal aspects of cyber security (cyber laws and regulations)

HURRY UP! Book your Seat

SUBSCRIBE TO NEWSLETTER

Want Something Extra?