We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Security And Risk ManagementThe confidentiality, integrity, and availability of information; Security governance principles Compliance requirements Difficulties with information security law and regulation IT policies and procedures Risk-based management concepts
Asset SecurityManaging requirements Data security restrictions Safeguarding privacy Asset's retention Categorization and possession of data
Security Architecture And EngineeringEngineering processes using secure design principles Fundamental concepts of security models Security capabilities of information systems Assessing and mitigating vulnerabilities in systems Cryptography Designing and implementing physical security
Communications And Network SecurityProtecting network parts Protecting communication channels The use of layout values in network design and their protection
Identity and Access ManagementPhysical and logical access to assets Identification and authentication integrating third-party identification services with identity as a service Authorization mechanisms The identity and access provisioning lifecycle
Security Assessment and TestingVulnerability assessment and penetration testing Disaster recovery Business continuity plans Awareness training for clients
Security OperationsUnderstanding and supporting investigations Requirements for investigation types Logging and monitoring activities Securing the provision of resources Foundational security operations concepts Applying resource protection techniques Incident management Disaster recovery Managing physical security Business continuity
Software Development SecurityExamining hazard evaluation Detecting weaknesses in source codes