TOPICS TOPICS LIST
Quantum Cryptography
Networks and infrastructure security
Hardware and systems security
Operating systems and software security
Web, Big data and Cloud security
Distributed systems and data center security
Security and privacy for embedded systems, IoT and Cyber Physical Systems
Information security, data provenance, and information assurance
Prevention, detection and investigation of APTs, DDoS and other cyber attacks
Cryptology, cryptanalysis and security analysis of cryptographic primitives and protocols
Anti-malware techniques: detection, analysis, and prevention
Artificial Intelligence aided security and privacy concerns
(Adversarial) Machine learning and cyber deception
(Anti-) Reverse engineering, side channel attacks and physical attacks
Protection of digital services and applications
Digital forensics, social media, networks, computer and mobile forensics
Automated security analysis of protocols, source code and binaries
Security, Privacy, and Trust in Digital Payments and Crypto currencies
Security and privacy issues in Blockchain
Security, privacy and resilience in critical infrastructures
Testing, auditing and evaluation of security architectures and models
Security issues in 5G Networks and Beyond
Security for future Internet architectures and designs
Measurements and monitoring of human behavior in cyberspace
Interdisciplinary research connecting cyber security and privacy to psychology.
Usable security and privacy: human factors and societal aspects
Cybercrime defense (anti-phishing, anti-blackmailing, anti-fraud, etc.) techniques
Policy making and legal aspects of cyber security (cyber laws and regulations)