Topics
- Cloud Computing
- Threat detection techniques
- Malware detection
- Visualization for security
- Data analytics for security
- Software and data segregation security
- Secure and trusted workflows in cloud computing and services
- Data obfuscation
- Cryptography and encryption techniques
- Identification and privacy
- Cloud access control and key management
- Accountability
- Big Data
- Granular access control
- Data provenance
- Secure computations in distributed programming frameworks
- Granular audit
- Nosql database security
- Data storage and transaction logs security
- Real time security and compliance monitoring
- End-point input validation/filtering
- Cryptographically enforced access control and secure communications
- Scalable and compostable privacy preserving analytics methods
- Fault tolerance
- Analytics and security
- Malware detection
- Tampering avoidance and detection
- Scalability and Robustness
- System and Data Integrity
- IT Security
- Fraud detection
- Anomaly detection
- Malware detection
- Open source intelligence
- Secure by design
- Secure code
- Offensive and defensive techniques
- IoT
- Methods for security analysis and audit
- Methods for secure by design
- Security protocols
- Privacy and anonymization techniques
- Naming, address manage and end to end addressability
- Lightweight security solutions
- Identification and biometrics
- Authentication and access control
- Liability and Policy enforcement
- Identity Management
- Risk analysis for CPS
Full Paper Submission Deadline: 6 June 2016
Final Paper (Camera-Ready) Submission Deadline: 8 July 2016
Early Bird Registration Deadline: 19 August 2016
Late Registration Deadline: 9 September 2016
Conference Dates: 14 - 15 November 2016