CALL FOR PAPERS
Digital Forensic
- Digital Forensics Process Model
- Business Application of Digital Forensics
- Information Systems and Crime Analysis
- Digital Forensics Techniques and Tools
- Database Forensics
- Mobile and Multimedia Forensics
- Cloud Forensics
- Network Forensics
- Big Data and Digital Forensics
- Digital Forensics Tool Testing and Validation Process
- Cyber Forensics
- Digital Anti and Counter Forensics
- Data Hiding and Recovery
- Cyber Terrorism
- Cyber Crime Investigations
- Forensics Visualization
Cryptography
- Block Ciphers
- Public Key Cryptography
- Stream Ciphers
- Quantum Cryptography
- Elliptic Curve Cryptography
- Homomorphic Encryption
- Algebraic Curves in Cryptography
- Cryptographic Protocols
- Zero-Knowledge
- Cryptanalysis
- Secret Sharing
- Hash Functions
- Applications of Coding Theory in Cryptography
- Cryptographic Hardware and Embedded Systems
- Smart Card Applications and Security
- Special Purpose Hardware for Attacking Cryptographic Systems
- Side-Channel Analysis and Countermeasures
- Key and Identity Management
- Pairing Based Cryptography
- Authentication
- Network Security
Cybersecurity and Threat Analysis
- Malicious Software
- Smartphone Malware
- Targeted Attacks
- Analysis and Measurements of Real Malware Incidents
- Worms, Viruses, and Other Propagating Malware
- Honeypots and Other Sample Collection Methodologies
- Spyware, Keystroke Loggers, Information Theft Malware
- Botnet Attacks, Detection/Tracking, and Defense
- Malware Economics and Black-market Studies
- Malware Performance, Analysis, and Capture Tools
- Code Reverse Engineering Tools and Practices
- Anti-spam and Anti-phishing Techniques and Practices
- Legal Aspects of Unwanted Software Use
- Rootkit and Virtualization Techniques
- Malware and its Impact on Social Networking and Cloud Computing
- Malware in Wireless Mobile Devices
Computing and System Engineering
- Artificial Intelligence System
- Decision Support System
- Web and Data Analytics
- Web and Data Mining
- Knowledge Engineering and Mining
- Cloud Computing and Cyber Physical System
- Internet of Things: System and Smart Applications
- Embedded System
- Knowledge and System Integration
- Standards and Interoperability
Publication Opportunities
All accepted and presented papers will be submitted for inclusion into IEEE Explore subject to meeting IEEE Xplore’s scope and quality requirements. The papers will be considered for inclusion in the IEEE Xplore Digital Library (indexed in Web of Science and Scopus).