Researchers and authors are invited to submit original high quality technical papers of their newest research findings, novel technical studies, innovative ideas and approaches, visionary papers in the broad field related to Computing Science, Network Communication and Security.

  • Track 1: Cyber Security
  • Track 2: Artificial Intelligence and Machine Learning
  • Access Control, Cryptography, Security and Privacy, Trust based Security, Information Security, Biometrics Security, Internet Security, Computer Network Security, Application Security, Mobile Security, Phishing detection and prevention, Botnet detection, Malware identification and analysis, Web Service Security, Software Coding Security, Security in middleware, Interface and Interaction, Digital Trust and reputation, Secure Transactions, Secure Protocols, Cloud Computing Security and Privacy, Fault Tolerance and Diagnosis, Digital Watermarking, Fingerprinting, Stenography and Forensic Analysis of Cyber Crimes and Network Intrusion Detection.
  • Detecting Cyber security Threats and Anomalies using Artificial Intelligence and Machine Learning, Artificial Neural Networks, Fuzzy Logic, Expert Systems, Agents and Multi-agent Systems, Natural Language Processing, AI approaches to trust and reputation, Vulnerability testing through intelligent probing (e.g. fuzzing), Security of Deep Learning Systems, Anomalous behavior detection and Secure multiparty computation and cryptographic approaches, Data poisoning attacks on machine learning, Trojan/backdoor attacks on machine learning, Privacy of Machine Learning, Proxies and middleware for wireless and sensor networks security and Smart City Security and Privacy.