CALL FOR PAPERS
Cybersecurity and Trustworthy AI
- Explainable AI / Interpretable models
- Adversarial ML & robustness
- AI ethics, governance, and alignment
- Autonomous decision-making systems
- Federated & distributed learning
- LLM engineering, optimization, and evaluation
- AI verification and safety assurance
- Network and system security
- Malware detection and analysis
- Cyber-physical security
- Malicious software
- Targeted attacks
- Smartphone malware
- Analysis and measurements of real malware incidents
- Worms, viruses, and other propagating malware
- Spyware, keystroke loggers, information theft malware
- Honeypots and other sample collection methodologies
- Botnet attacks, detection/tracking, and defense
- Malware economics and black-market studies
- Code reverse engineering tools and practices
- Malware performance, analysis, and capture tools
- Anti-spam and anti-phishing techniques and practices
- Legal aspects of unwanted software use
- Malware and its impact on social networking and cloud computing
- Rootkit and virtualization techniques
- Malware in wireless mobile devices
- Penetration Testing
Cryptography and Authentication
- Cryptanalysis
- Quantum cryptography
- Blockchain security and anonymity
- Block Ciphers
- Stream Ciphers
- Public Key Cryptography
- Quantum Cryptography
- Elliptic Curve Cryptography
- Algebraic Curves in Cryptography
- Homomorphic Encryption
- Cryptographic Protocols
- Zero-Knowledge
- Secret Sharing
- Cryptanalysis
- Hash Functions
- Applications of Coding Theory in Cryptography
- Smart Card Applications and Security
- Cryptographic Hardware and Embedded Systems
- Special Purpose Hardware for Attacking Cryptographic Systems
- Side-Channel Analysis and Countermeasures
- Pairing Based Cryptography
- Key and Identity Management
- Authentication
Digital Forensics and Incident Response
- Cloud, edge, and container forensics
- Incident response & forensic intelligence
- Digital Forensics Process Model
- Information Systems and Crime Analysis
- Business Application of Digital Forensics
- Digital Forensics Techniques and Tools
- Database Forensics
- Cloud Forensics
- Mobile & Multimedia Forensics
- Network Forensics
- Big Data and Digital Forensics
- Cyber Forensics
- Digital Forensics Tool Testing and Validation Process
- Anti and Counter Forensics
- Data Hiding and Recovery
- Cyber Crime Investigations
- Cyber Terrorism
- Forensics Visualization
- Drone Forensics
- IoT Forensics
- Security Operating Center
- Memory Forensics
Sustainable, IoT, Edge–Cloud Computing & Cyber-Physical Systems
- IoT protocols and architectures
- Edge AI and distributed computing
- 6G-enabled IoT systems
- Embedded systems and sensor networks
- Digital twins for industrial applications
- Smart transportation and smart city systems
- Cyber-physical system integration
Data Science, Web Mining & Applied Computing Systems
- Big data engineering and pipelines
- Data mining and knowledge discovery
- Knowledge graphs and semantic computing
- Data-driven decision support
- Web analytics and recommendation systems
- Optimization and computational intelligence
- Applied analytics for smart environments
- Artificial Intelligence System
- Decision Support System
- Web and Data Analytics
- Web and Data Mining
- Knowledge Engineering and Mining
- Cloud Computing and Cyber Physical System
- Internet of Things System and Smart Applications
- Embedded System
- Knowledge and System Integration
- Standards and Interoperability