Topics

Authentication

Big Data Analysis for security & forensics

Biometrics

Computational Forensics

Critical infrastructure protection

Cryptology

Digital Forensics

Information security engineering

Information security innovations and spin-offs

Information security modelling, simulation and analysis

(Risk assessment, risk analysis, security metrics, adversary modelling, information security games)

Intrusion detection systems

Mobile devices

Network and Internet security

Pattern recognition / Computational Intelligence

Privacy

Security management

Side-Channel attacks

Signal and Image Processing

Software Security and Malware

Wireless communication security