Themes
Conference Topics
ICACSDF2025 invites original contribution which has not been published or communicated anywhere else, to this blind and peer reviewed conference. Accepted papers will be submitted for inclusion in Springer Proceedings subject to meeting Springer’s scope and quality requirements. The theme for the conference are the following but not limited to:
1. Privacy and Information Security
- Authentication and authorization of users, systems, and applications
- Business models and systems with security and privacy requirements and management
- Case studies in security and privacy
- Computer worms and viruses
- Cryptographic techniques and protocols
- Database issues in privacy protection
- Electronic commerce, banking, and payment protocols
- Encryption, authentication, and access control
- Enhancements for storage area networks
- File and file system security and privacy
- Firewall technologies, policies, and trends
- Hacking and corruptions
- Hacking, cyber-terrorism, and intrusion detection
- Malicious codes and attacks against networks
- Multiparty communications, co-operations, and computations
- Networks and security protocols
- Relationships and trade-offs between security and privacy
- Security and privacy techniques, management, and protocols
2. Advancements in Cryptography
- Identity and privacy confidentiality
- Applied cryptography in the cloud
- Anonymity and authentication
- Cryptographic implementation and testing
- Cryptographic protocols
- Cryptanalysis and attacks
- Data security and trusted platform modules
- Privacy protection
- Digital signatures and e-voting
- Information security
- Key distribution and management
- Identification and identity-based cryptography
- Online fraud and web security
- Trust management
3. Cyber Threat Intelligence (CTI) and Mitigation
- Threat modeling
- Threat and vulnerability analysis
- AI/ML-based cyber threat analysis
- Data privacy in CTI management
- Interoperability issues in CTI sharing
- CTI evaluation
- Deception technologies
- Dynamic risk management analysis
- Cyber-threat detection and response
- CTI sharing and consumption
- Cyber-threat hunting and curation
- Blockchain-based CTI management
- Dark Web CTI exploration
- Threat analysis for cyber-physical systems
- CTI-based dynamic risk management
4. Quantum Cryptography
- Quantum Key Distribution
- Secure Quantum Computing
- Quantum Cryptanalysis
- Quantum Hacking
- Quantum Internet
- Device-Independent Cryptography
5. Blockchain Technology: Innovations and Applications
- Securing Smart Contracts
- Blockchain Vulnerabilities and Threats
- Privacy Solutions in Blockchain
- Identity Management and Blockchain Security
- Governance Models in Blockchain Security
- Cryptographic Techniques for Blockchain
- Regulatory Compliance in Blockchain Security
- Consensus Mechanisms and Security
- Incident Response in Blockchain Environments
- Security Best Practices for Blockchain Deployments
- Issues of security and privacy surrounding blockchain technology
- Fraud detection and financial crime prevention
6. AI & ML in Cybersecurity
- Deep Learning/Deep Reinforcement Learning Methods for Cybersecurity Defenses
- Cyber Vulnerability Prioritization and Remediation
- Network Intrusion Detection and Mitigation
- Red Team Evaluation of Cyber Defense Systems
- Adversarial Behavior Modeling
- Game Theoretical Cybersecurity Models
- Representation Learning for Cybersecurity Applications
- Interpretable and Robust Autonomous Cyber-Systems
7. Security Policies, Auditing, and Assurance
- Enterprise Security Policies
- Internal Auditing
- Risk Management in Security
- Compliance Auditing
- Information Assurance
- VoIP Network Security
- Human Factors in Security
- Developing Cybersecurity Policies
- Cybersecurity Auditing Techniques
- Assurance Frameworks for Cybersecurity
- Risk Management in Cybersecurity Policies
- Compliance Auditing in Cybersecurity
- Incident Response Policies
- Effectiveness of Security Controls
- Continuous Monitoring and Auditing
- Security Policy Enforcement Mechanisms
- Evaluating Cybersecurity Assurance Models
8. Digital Forensics
- Machine Learning in Digital Evidence Extraction
- Malware Analysis and Attribution
- Big Data Forensics
- Non-Traditional Forensic Scenarios
- Network and Distributed Forensics
- Mobile and Embedded Forensics
- Cloud and Virtual Forensics
- Medical Device Forensics
- Smart Grid Forensics
- Digital Evidence Law and Policy
9. Internet of Things (IoT) Security
- IoT Device Security
- IoT Network Vulnerabilities
- Securing IoT Ecosystems
- IoT Authentication and Access Control
- IoT Data Privacy
- Threat Detection in IoT
- IoT Firmware Security
- IoT in Critical Infrastructure
- Blockchain for IoT Security
- IoT Security Standards
10. Software Security
- Secure Software Development Lifecycle (SDLC)
- Code Vulnerability Detection
- Static and Dynamic Application Security Testing
- Security in Open Source Software
- Software Patch Management
- Software Supply Chain Security
- Memory Safety in Software
- Secure Coding Practices
- Threat Modeling in Software Design
- Software Security in Agile and DevOps
11. Web Security
- Preventing Cross-Site Scripting (XSS)
- Mitigating SQL Injection Attacks
- Web Application Firewalls (WAF)
- Authentication and Session Management in Web Applications
- Content Security Policy (CSP) Implementation
- Secure HTTPS and TLS Configurations
- Cross-Site Request Forgery (CSRF) Protection
- Web Vulnerability Scanning Tools
- Securing APIs in Web Applications
- Preventing Web Application DoS/DDoS Attacks
12. Security Testing & Auditing
- Penetration Testing Methodologies
- Automated Security Testing Tools
- Vulnerability Scanning Techniques
- Risk-based Security Auditing
- Compliance Auditing in IT Systems
- Application Security Testing Frameworks
- Continuous Security Monitoring
- Auditing for Data Privacy Compliance
- Red Team vs. Blue Team Exercises
- Post-Breach Security Auditing
13. Security Protocols
- Cryptographic Protocols for Secure Communication
- Transport Layer Security (TLS) Protocols
- Secure Key Exchange Protocols
- Multi-Factor Authentication Protocols
- Network Security Protocols (IPSec, SSL)
- Blockchain Consensus Protocols
- Wireless Security Protocols (WPA3, WEP)
- End-to-End Encryption Protocols
- Zero Trust Security Protocols
- Security Protocols in IoT Devices
14. Malware Analysis & Detection
- Static vs. Dynamic Malware Analysis
- Behavioral Analysis of Malware
- Machine Learning for Malware Detection
- Signature-based Malware Detection Techniques
- Advanced Persistent Threat (APT) Detection
- Memory Forensics in Malware Analysis
- Malware Evasion Techniques and Countermeasures
- Network-based Malware Detection
- Ransomware Analysis and Prevention
- Malware Detection in IoT Environments
15. Information Hiding & Watermarking
- Steganography Techniques for Information Hiding
- Digital Watermarking for Media Security
- Robustness of Watermarking Algorithms
- Reversible Data Hiding Methods
- Watermarking in Encrypted Domains
- Image and Video Watermarking Techniques
- Audio Watermarking for Copyright Protection
- Steganalysis: Detecting Hidden Information
- Blockchain for Secure Watermarking
- Watermarking in Cloud Storage Systems
16. Database & System Security
- Database Encryption Techniques
- Access Control in Databases
- SQL Injection Prevention
- Secure Database Auditing
- Intrusion Detection in Database Systems
- Operating System Hardening
- Data Integrity and Authentication
- Role-Based Access Control (RBAC) in Databases
- System Patch Management for Security
- Database Activity Monitoring Tools
17. Cloud Computing Security
- Data Encryption in the Cloud
- Identity and Access Management (IAM) in Cloud
- Cloud Security Compliance
- Multi-Tenancy and Cloud Isolation
- Cloud Threat Detection and Prevention
- Zero Trust Architecture for Cloud
- Securing Cloud APIs
- Data Loss Prevention in the Cloud
- Cloud Security Monitoring Tools
- Privacy and Compliance in Cloud Storage