We are accepting abstracts for the 2025 Spring OkIP Conferences, which will be held April 1-3. If you have any questions, please email us at info@okipublishing.com and okipublisher@gmail.com.

3–6 Oct 2022 Conference
Tiako Center & Online
US/Central timezone

Scientific Tracks

  • Information Security Modeling and Design

    • Information Security Architecture Design
    • IS Authentication and Privacy Control
    • IS Frameworks and Protocols
    • IS Architecture Design and Testing
    • Data Breach Protection
    • Information Systems Security
    • Information Analytical Models
    • IS Modeling and Analysis
    • Critical Information Management
    • IS Performance, Requirements, and Issues
    • Security Information Sharing
  • AI in Security

    • AI/ Machine Learning for Security
    • Cryptographic Checksums and Algorithms
    • Risk and Reputation Management
    • Malware Detection and Response
    • Vulnerability Analysis and Countermeasures
    • Intrusion Detection and Anomaly Recovery
    • Information/Temporal Access Controls
    • Vulnerability Detection
    • Improved Authentication Process
    • Information Hiding and Anonymity
    • Behavioral Biometrics
    • Security Situational Awareness
  • Security and Distributed Systems

    • Edge Computing Security
    • Trusted Computing | Crowdsourcing
    • Cyber-physical Systems Security
    • Distributed Systems Security
    • Embedded Systems Security
    • IS Virtualization and Data Center Network
    • Secure Internet Connectivity
    • Cloud Security and Adoption Risks
    • Physical-layer Security
  • Wireless and Digital Forensics

    • Trust Authority Distribution
    • Wireless Network Information Assurance (IA)
    • Bluetooth Information Assurance
    • Radio Frequency Fingerprints
    • Intelligent Forensic Systems
    • Honeypot Deception and Forensics
    • Steganography Techniques
    • Cyber-Attack Thwarting
    • Crime Data Mining
    • Anti-Spam Filtering Techniques
    • Untrusted Hardware Testing
    • Privacy Preservation and Protection
    • Intelligent and Secure Autofill Systems
  • IA and Information Warfare

    • Secure Passport System
    • Insider Threat Prediction
    • Key Management and Recovery
    • Critical Infrastructure Protection
    • Threat Awareness Analysis
    • Traffic Flow Confidentiality
    • Intellectual Property Protection
    • Cyber-Attack and Cyber-Terrorism
    • Tamper Detection and Prevention
    • Physical Security and Soldier Security
    • Electromagnetic Bomb and Electronic Attack
    • Tactical Communication and Network Security
  • IS & IA Applications

    • Electronic Voting System
    • Signature Verification
    • Parental Control Systems
    • Biometric Protection
    • Watermarking Techniques
    • Secure Diagnostic
    • Mobile Security | Database Security
    • Intelligent and Secure Autofill System
    • Energy Harvesting Security
    • IS & IA Awareness and Education
    • Green Communications Security
    • Power Information System Security
    • Corporations and Businesses Protection
    • Internet of Things Security
    • Software Security Assurance
  • IS & IA Policy and Legal Issues

    • IS & IA Policy Approaches
    • IS & IA Enforcement Models
    • Cybersecurity Legal
    • Regulatory Issues
    • Digital Rights Management
    • Ethics, Identity, and Trust Management
    • Steganography Legal Issues