The scope of this conference encompasses, but is not restricted to, the following topics and tracks:

Track A: Cybersecurity

  • Authentication, Privacy and Security Models
  • Intelligent data analysis for Security
  • Deep Learning in security and privacy
  • Identity and Trust Management
  • Intrusion, anomaly and fraud detection
  • Sensitive data collection Privacy-preserving data mining
  • Security and privacy of mobile cloud computing
  • Security and privacy in social applications and networks
  • Web application security
  • Cyber-Physical System and Cryptographic Algorithms
  • Quantum Cryptography
  • Android Security
  • Honeypot Technologies
  • Secure over the air update of software.
  • Cyber-security detection and prevention in Automotive
  • Data hiding algorithms.
  • Secret sharing and visual cryptography.
  • IoT Architectures for Critical Infrastructures Protection.

Track B:  Cybercrimes

  • Internet of Things Forensics
  • Forensic Data Analytics (FDA)
  • Vulnerability Assessment and Cyber Forensic
  • Deep learning for Image/Video Forensics
  • Deep learning-based anti-forensics
  • Deep learning for multimedia security
  • Deep learning for cyber security applications (e.g., malicious web content identification, intrusion detection and privacy-preserving, vulnerability and exploitation Identification, and facial and/or biometric spoofing detection)
  • Security challenges associated with deep learning
  • Cybercrime and Legal Issues
  • Digital Crime and International Laws
  • Socio-linguistic and Criminology
  • Digital Forensic in emerging Technologies
  • Forensic process and Models
  • Database forensic, Data leakage and Protection
  • Network Traffic Analysis and Vulnerabilities
  • Hardware/Software, Network and Email forensic
  • Digital Forensic Investigation and Evidence Management
  • Contemporary Attack, Threat and Malware Forensic
  • Anti-forensic in Steganography and water marking
  • Cloud Forensic and legal challenges
  • Drone Cybercrime and forensic
  • Financial crime including money laundering and electronic payment
  • Digital Rights and Protection of Intellectual Property
  • Cyber Risk Assessment and prediction

Track C:  Smart emerging technologies

  • AI and Machine Learning for Security
  • Data mining for security and privacy
  • AI for Healthcare and Biometric Security
  • Blockchain-based multimedia content security
  • Blockchain-based business intelligence
  • Blockchain-based information design and delivery
  • Blockchain-based security in organizations
  • Healthcare Blockchain System
  • Secure Automated Remote Patient Monitoring
  • Blockchain-based secure smart wearable systems
  • Blockchain for information processing
  • Open issues and challenges of Blockchain-based information processing and cyberspace security
  • Cloud Computing
  • Distributed Computing
  • Fog Computing
  • Mobile Computing
  • Application of blockchain for secure smart city
  • Blockchain IoT applications and platforms for the development of IoT solutions.
  • Challenges to address the integration of the IoT with blockchain.
  • Blockchain for secure next-generation communication
  • Computational intelligence in security and privacy
  • Big data security analytics
  • Secure Techniques for Big Data
  • Big data intelligence in security and privacy
  • Digital forensic intelligence (DFINT)
  • Data Analytics for privacy-by-design in smart health
  • Analysis of cryptocurrency-enabled crimes
  • Case Studies and Innovative Applications
  • Emerging Technologies Issues and Challenges
  • Security in Cloud and Fog Computing
  • Security in Big Data, Machine Learning and Deep Learning
  • Security in Blockchain Technologies and Applications
  • Security in IoT and edge cutting technologies
  • Security in healthcare and wearable technologies
  • Security in Data mining and Information retrieval knowledge Discovery
  • Security and privacy in AR/VR systems
  • Bioinformatics security
  • Cyber Security Resilience in contemporary application
  • Cyber security in smart Environment and Smart cities
  • Ethnic bias in Image processing and recognition accuracy
  • Cyber security Concerns in Industry X.0
  • Security and Privacy in Competitive Agility
  • Security and Privacy in Smart Grids
  • VLSI and Embedded System Security
  • Control, Instrumentation SCADA and PLC Security
  • Privacy and Protection in Automation and Robotics
  • Security and Protection Complex Systems
  • Security and Protection Crowdsourcing
  • Security and Protection in IT Outsourcing