CALL FOR PAPERS

Cybersecurity and Trustworthy AI
  • Explainable AI / Interpretable models
  • Adversarial ML & robustness
  • AI ethics, governance, and alignment
  • Autonomous decision-making systems
  • Federated & distributed learning
  • LLM engineering, optimization, and evaluation
  • AI verification and safety assurance
  • Network and system security
  • Malware detection and analysis
  • Cyber-physical security
  • Malicious software
  • Targeted attacks
  • Smartphone malware
  • Analysis and measurements of real malware incidents
  • Worms, viruses, and other propagating malware
  • Spyware, keystroke loggers, information theft malware
  • Honeypots and other sample collection methodologies
  • Botnet attacks, detection/tracking, and defense
  • Malware economics and black-market studies
  • Code reverse engineering tools and practices
  • Malware performance, analysis, and capture tools
  • Anti-spam and anti-phishing techniques and practices
  • Legal aspects of unwanted software use
  • Malware and its impact on social networking and cloud computing
  • Rootkit and virtualization techniques
  • Malware in wireless mobile devices
  • Penetration Testing
Cryptography and Authentication 
  • Cryptanalysis  
  • Quantum cryptography 
  • Blockchain security and anonymity 
  • Block Ciphers 
  • Stream Ciphers 
  • Public Key Cryptography 
  • Quantum Cryptography 
  • Elliptic Curve Cryptography 
  • Algebraic Curves in Cryptography 
  • Homomorphic Encryption 
  • Cryptographic Protocols 
  • Zero-Knowledge 
  • Secret Sharing  
  • Cryptanalysis 
  • Hash Functions 
  • Applications of Coding Theory in Cryptography 
  • Smart Card Applications and Security 
  • Cryptographic Hardware and Embedded Systems 
  • Special Purpose Hardware for Attacking Cryptographic Systems 
  • Side-Channel Analysis and Countermeasures 
  • Pairing Based Cryptography 
  • Key and Identity Management 
  • Authentication 
Digital Forensics and Incident Response
  • Cloud, edge, and container forensics
  • Incident response & forensic intelligence
  • Digital Forensics Process Model
  • Information Systems and Crime Analysis
  • Business Application of Digital Forensics
  • Digital Forensics Techniques and Tools
  • Database Forensics
  • Cloud Forensics
  • Mobile & Multimedia Forensics
  • Network Forensics
  • Big Data and Digital Forensics
  • Cyber Forensics
  • Digital Forensics Tool Testing and Validation Process
  • Anti and Counter Forensics
  • Data Hiding and Recovery
  • Cyber Crime Investigations
  • Cyber Terrorism
  • Forensics Visualization
  • Drone Forensics
  • IoT Forensics
  • Security Operating Center
  • Memory Forensics
Sustainable, IoT, Edge–Cloud Computing & Cyber-Physical Systems 
  • IoT protocols and architectures 
  • Edge AI and distributed computing 
  • 6G-enabled IoT systems 
  • Embedded systems and sensor networks 
  • Digital twins for industrial applications 
  • Smart transportation and smart city systems 
  • Cyber-physical system integration 
Data Science, Web Mining & Applied Computing Systems 
  • Big data engineering and pipelines 
  • Data mining and knowledge discovery 
  • Knowledge graphs and semantic computing 
  • Data-driven decision support 
  • Web analytics and recommendation systems 
  • Optimization and computational intelligence 
  • Applied analytics for smart environments 
  • Artificial Intelligence System 
  • Decision Support System 
  • Web and Data Analytics 
  • Web and Data Mining 
  • Knowledge Engineering and Mining 
  • Cloud Computing and Cyber Physical System 
  • Internet of Things System and Smart Applications 
  • Embedded System 
  • Knowledge and System Integration  
  • Standards and Interoperability 
Scroll to Top