• bg-slider-5.png

CONFERENCE TOPICS


Cyber ​​Security

Cyber Security and Defense

Cyber Security Policies

Cyber Weapons

Cyber Attacks and Attack Surfaces

Cyber Defense

Cyber Intelligence and Counter Intelligence

Cyber Ethics

Cyber Spaces

Cyber Physical Systems

Cyber Vulnerabilities

Cyber Security Standards

Cyber Security Protocols

Cyber Wars

Cyber Media Issues


Digital Forensics

Digital Forensics

Cybercrime

Counter-Forensic and Counter-Forensic Techniques

Data leakage and Data Protection

Mobile Forensics

Database Forensics

Memory Forensics

Forensic Medicine

Multimedia Forensics

Malware Forensics

Cloud Forensics

Network Forensics

Hardware Sensitivity and Forensic Computing Devices

New Threats and Unconventional Approaches


Information Assurance and Security Management

Business Continuity and Disaster Recovery Planning

Corporate Governance

Critical Infrastructure Protection

Digital Rights Management and Intellectual Property Protection

Security Economics

Fraud Management

Identity Management

Laws and Regulations

Security Policies and Trust Management

Threats, Vulnerabilities, and Risk Management

Enterprise System Security

Distributed System Security

Critical system Security

Event Processing

Penetration Testing

Legal Issues Inquiries

Multimedia and Document Security

Operating Systems and Database Security

SCADA and Embedded System Security

Secure Software Development

Cloud Security

Big Data Privacy and Security

Security in Social Networks

Security of Web-Based Applications and Services

Security Protocols

VOIP security

Wireless and Telecommunications Network Security

Privacy Issues

Surveillance Systems

Biometrics Applications and Standards

Trends and Approaches in Cyber Warfare

Electronic Passports, National Identity and Smart Card Security

Social Engineering

Identity and Access Control Systems

New Theory and Algorithms


IoT Applications, Services and Supported Technologies

4, 4,5 and 5G Networks

IoT, EoT, Nano Internet of Things

Named Data Network for IoT (NDN)

Software Defined Networks (SDN)

Sensor and Actuator Networks

Ultra-low power IoT Technologies and Embedded System Architects

Wearable Devices, Body Sensor Networks, Smart Portable Devices

Design Space Discovery Techniques for IoT Devices and Systems

Heterogeneous Networks

IoT Protocols (IPv6, 6LoWPAN, RPL, 6TiSCH, W3C)

Sensor Data Management, IoT Mining and Analytics

Adaptive Systems

Distributed Storage

Data Fusion

Routing and Control Protocols

Resource Management, Access Control

Identity Management and Object Recognition

Locating Technologies

Endpoint Computing, Fog Computing and IoT

M2M and IoT

Industrial IoT

Cyber-Physical Systems

Collaborative Applications and Systems

Service Experiences and Analysis

Smart Cities, Smart Public Places, Smart Home / Building

e-Health, Life Support

Smart Transportation

Smart Grids, Energy Management

Consumer Electronics

Rural Services and Production

Industrial IoT Service Creation and Management

Mass-Based Perception, Human-Centered Perception

Big Data and IoT Data Analytics

Semantic Technologies

Mobile Cloud Computing and IoT

Horizontal Application Development for IoT

Design Principles and Best Practices for IoT Application Development

IoT Privacy and Security Concerns

Authentication and Authentication Issues

Wireless Sensor Network for IoT Security

Intrusion Detection in IoT

Cryptography, key management and authorization for IoT

Physical / MAC / Network Attacks in IoT

Cross-Tiered Attacks in IoT

Security with IoT Optimization in IoT

Privacy-Based Channel Access at IoT

IoT Forensics

Integrity of Big Data and Information at IoT

Communication Security at IoT

Safety Standards at IoT

Human Role in IoT, Social Services

Value Chain Analysis

New Human-Device Interactions for IoT

Social Models and Networks

Green IOT: Sustainable Design and Technology

Urban Dynamics and Audience Services

Measurements and Evaluations for IoT Sustainability and ROI

Closing Gap between Research and Practice

Experimental Prototypes and Testing Environments

Multi-purpose IoT System Modeling and Analysis

IoT Interconnect Analysis

Real Case Distribution Scenarios and Results

Standardization and Regulation


Post-Quantum Cryptography

Quantum Cybersecurity in the real world

Post-Quantum Cryptograhpy