CYBER SECURITY

Revolution in digital information has evolved drastically and has far broader applications and implications than we can imagine. From critical infrastructure of a State to the health monitoring of an individual, the dependence on digitalization is inevitable. Electronic infrastructure serves as the communication backbone of this. The reliable and robust working of this paradigm can be made possible through cyber security measures and controls. Beside other measures, secure cryptographic designs and efficient antimalware techniques play a vital role in this reliance. Moreover, cyberspace attacks show a direct threat to banking institutions, energy infrastructure, state agencies, and even social affairs.

The track aims to bring together researchers working in different aspects of cyber security to make meaningful progress in this body of knowledge and solve real-world security problems. Particular focus is given to the research areas involving latest topics & emerging cyber security concepts, techniques, technologies, and trends like: Internet of Things(IoT), Big Data and Artificial Intelligence (AI) applications in Cyber Security, Software Defined Networks, Blockchain and CryptoCurrency, etc. The topics of interest include, but are not limited to:-

The topics of interest include, but are not limited to:-

  • Emerging Cyber Security Trends: Threats and Countermeasures
  • Hardware and Software Security
  • Security, Privacy and Risk Management
  • Supply Chain Security
  • Virtualization Security
  • Security of Cyber-Physical Systems
  • Security of Industrial Control System
  • Anonymity and Identity Management
  • Digital Forensics
  • Data Loss Prevention Techniques
  • Intrusion Detection and Prevention Systems
  • Malware and Malicious Code Analysis
  • AI based Cyber Security
  • Internet of Things (IoT) Security
  • Social Media Privacy and Security
  • Blockchain Applications and Security
  • Post-Quantum Cryptography
  • Leakage Resilient Cryptography
  • Block Cipher Design and Analysis
  • Multi-party Computation protocols
  • Formal Analysis of Cryptographic Protocols
  • Homomorphic Encryption
  • Searchable Encryption

This year track invites proposals to conduct Special Sessions on Cryptography and Malware Analysis. The track also warmly welcomes the proposals for “Special Sessions”, “Tutorials”, “Technical Workshops”, “Training Sessions”, and “Security Demos” in allied areas of Cyber Security aligned with the theme of the track.


Dates to Remember 2022

Participation/Attendees
(Application Deadline)
15th Jun 2022
Registration Fee Payment
(All Categories)
10th Jul 2022
Confirmation of Participation
(Notification)
20th Jul 2022 onwards