In response to COVID-19, most meetings and conferences are still taking place virtually with only limited in-person meetings which comply with local public health instructions for social distancing. Meeting or conference organizers will provide participants with detailed information about their methods of delivery and attendance modes.
Nov 15 – 18, 2021 Conference
MNTC Tech Campus, Oklahoma City, OK, USA and Online
UTC timezone
Explore and Discover Oklahoma Beauties...

Scientific Tracks

  • Conference Technical Main Tracks

    Conference technical main tracks

    • Information Security Modeling and Design

      ● Information Security (IS) Architecture Design
      ● IS Authentication and Privacy Control
      ● IS Frameworks and Protocols
      ● IS Architecture Design and Testing
      ● Data Breach Protection
      ● Information Systems Security
      ● Information Analytical Models
      ● IS Modeling and Analysis
      ● Critical Information Management
      ● IS Performance, Requirements and Issues
      ● Security Information Sharing

    • AI in Security

      ● AI/ Machine Learning for Security
      ● Cryptographic Checksuns and Algorithms
      ● Risk and Reputation Management
      ● Malware Detection and Response
      ● Vulnerability Analysis and Countermeasures
      ● Intrusion Detection and Anomaly Recovery
      ● Information/Temporal Access Controls
      ● Vulnerability Detection
      ● Improved Authentication Process
      ● Information Hiding and Anonymity
      ● Behavioral Biometrics
      ● Security Situational Awareness

    • Security and Distributed Systems

      ● Edge Computing Security
      ● Trusted Computing | Crowdsourcing
      ● Cyber-physical Systems Security
      ● Distributed Systems Security
      ● Embedded Systems Security
      ● IS Virtualization and Data Center Network
      ● Secure Internet Connectivity
      ● Cloud Security and Adoption Risks
      ● Physical-layer Security

    • Wireless and Digital Forensics

      ● Trust Authority Distribution
      ● Wireless Network Information Assurance (IA)
      ● Bluetooth Information Assurance
      ● Radio Frequency Fingerprints
      ● Intelligent Forensic Systems
      ● Honeypot Deception and Forensics
      ● Steganography Techniques
      ● Cyber-Attack Thwarting
      ● Crime Data Maning
      ● Anti-Spam Filtering Techniques
      ● Untrusted Hardware Testing
      ● Privacy Preservation and Protection
      ● Intelligent and Secure Autofill Systems

    • IA and Information Warfare

      ● Secure Passport System
      ● Insider Threat Prediction
      ● Key Management and Recovery
      ● Critical Infrastructure Protection
      ● Threat Awareness Analysis
      ● Traffic Flow Confidentiality
      ● Intellectual Property Protection
      ● Cyber-Attack and Cyber-Terrorism
      ● Tamper Detection and Prevention
      ● Physical Security and Soldier Security
      ● Electromagnetic Bomb and Electronic Attack
      ● Tactical Communication and Network Security

    • IS & IA Applications

      ● Electronic Voting System
      ● Signature Verification
      ● Parental Control Systems
      ● Biometric Protection
      ● Watermarking Techniques
      ● Secure Diagnostic
      ● Mobile Security | Database Security
      ● Intelligent and Secure Autofill System
      ● Energy Harvesting Security
      ● IS & IA Awareness and Education
      ● Green Communications Security
      ● Power Information System Security
      ● Corporations and Businesses Protection
      ● Internet of Things Security
      ● Software Security Assurance

    • IS & IA Policy and Legal Issues

      ● IS & IA Policy Approaches
      ● IS & IA Enforcement Models
      ● Cybersecurity Legal
      ● Regulatory Issues
      ● Digital Rights Management
      ● Ethics, Identity and Trust Management
      ● Steganography Legal Issues

  • Other Conference Tracks or Activities

    Other conference tracks or activities

    • Other Conference Tracks or Activities

      Other Conference Tracks or Activities