CYBER SECURITY & ASSURANCE TECHNOLOGIES

Digital information is revolutionizing all fields of technology with electronic infrastructure serving as the communication backbone. Cyber Security is a rapidly growing area encompassing IT systems, computer networks, software, communications, cryptography and various other disciplines. Due to recent technological developments, the dependence of economy and other public and private affairs on internet and digital infrastructure is on the rise. This reliance demands reliability and security of cyber space and information flow. Furthermore, cyber space attacks show a direct threat to banking institutions, energy, infrastructure, state agencies and even social affairs. Therefore, security and reliability has become crucial.

The aim of the track is to bring together researchers working on different aspects of cyber security to advance this particular body of knowledge and solve the real world security related problems. Particular focus is given to the research areas involving latest topics & emerging cyber security concepts, techniques, technologies and trends, e.g., Internet of Things(IoT), Cognitive Computing and Deep Learning, Fog Computing, Cloud Computing, Virtualization, Edge Computing, Artificial Intelligence and Machine Learning, Big Data Processing and Analytics, Software Defined Networks, Blockchain, Crypto Currency, etc.

Computing software requires specialized quality assurance and testing techniques like formal verification to confirm absence of bugs. Formal verification exposes the boundary conditions and worst case scenarios which are not possible using merely computer simulations. This part of the activity also invites researches in the fields like Software Quality, Theory of Automata, Logic and Formal verification, etc.

Topics of interest include, but are not limited to:-

  • Emerging Cyber Threats and Defense
  • System and Network Security
  • Protocol Analysis and Security
  • Virtualization Security
  • Data Loss Prevention Techniques
  • Digital Forensics
  • Privacy and Risk Management
  • Malicious Code Analysis
  • Hardware Security
  • Trojans Detection and Prevention
  • Supply Chain Security
  • Security of Cyber-Physical Systems
  • Security of Industrial Control System (ICSs)
  • Anonymity and Identity Management
  • Software Quality Assurance
  • Formal Methods and Theory of Automata
  • Exploiting and Exploring Secure Mathematics (Cryptography)
  • Artificial Intelligence applied on cyber security
  • Internet of Things – Security in Smart Devices
  • Blockchain and Crypto Currency
  • Cryptographic Security and Evaluation Standards
  • Machine Learning Techniques for Cyber Security
  • Quantum Security and Legacy Security Solutions
  • Mathematical Evaluation of Security Solutions
  • Zero Trust - Handling Insider Attacks

The track also invites and warmly welcomes the proposals for “Special Sessions”, “Tutorials”, “Technical workshops”, “Training sessions (Including Hands-On)”, and “Security Demos” in allied areas of Cyber Security aligned with regular theme of the track.