Call for Papers

ConferenceTracks

The scope of this conference is to provide a global platform for researchers, engineers, academicians, and industry professionals to present their latest research findings and development activities in cybersecurity, privacy, and heterogeneous emerging technologies. The conference facilitates discussion on recent advancements, challenges, and future directions in these rapidly evolving domains, enabling participants to exchange ideas, explore innovative solutions, and contribute to the global research community in the 21st century.

Track 1: : Cybersecurity for Emerging Technologies

Cybersecurity frameworks for Industry 4.0/5.0, secure architecture design, zero-trust models, risk assessment, secure DevOps, cloud security, edge and fog security, and quantum-resistant security protocols.

Track 2: Privacy-Preserving Techniques and Secure Data Sharing

Data anonymization, differential privacy, homomorphic encryption, secure multiparty computation, federated learning security, privacy-enhancing technologies, GDPR and global compliance frameworks, identity management.

Track 3: Human-Centric Design for Secure Systems

User-centred security design, privacy-by-design principles, usable security, ethics of cybersecurity, human factors in threat detection, behavioral biometrics, trust and transparency in digital systems.

Track 4: Artificial Intelligence and Machine Learning for Cyber Defense

AI-driven threat detection, deep learning for intrusion detection, adversarial machine learning, automated incident response, anomaly detection, predictive analytics for cybersecurity, threat intelligence platforms.

Track 5: Cyber-Physical Systems Security and Critical Infrastructure Protection

Security of SCADA and industrial control systems, IoT and IIoT security, smart grid and smart city infrastructure protection, autonomous vehicle security, healthcare IoT security, supply chain security.

Track 6: Blockchain, IoT, and 5G/6G Security

Secure distributed ledgers, blockchain for identity and access management, lightweight cryptography for IoT, 5G/6G network security, mobile edge computing security, secure interoperability between heterogeneous systems.

Track 7: Ethical, Legal, and Policy Aspects of Cybersecurity and Privacy

Cyber laws and digital governance, data protection policies, global cybersecurity strategies, cyber diplomacy, ethics of AI in security, privacy risk assessments, regulatory compliance and audit frameworks.

Track 8: Future Trends and Innovations in Security and Privacy

Post-quantum cryptography, emerging threat landscapes, bio-cybersecurity, digital twins security, autonomous systems security, next-generation authentication, sustainable security practices, cyber resilience frameworks.

Scroll to Top