We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Security And Risk Management
The confidentiality, integrity, and availability of information; Security governance principles Compliance requirements Difficulties with information security law and regulation IT policies and procedures Risk-based management conceptsAsset Security
Managing requirements Data security restrictions Safeguarding privacy Asset's retention Categorization and possession of dataSecurity Architecture And Engineering
Engineering processes using secure design principles Fundamental concepts of security models Security capabilities of information systems Assessing and mitigating vulnerabilities in systems Cryptography Designing and implementing physical securityCommunications And Network Security
Protecting network parts Protecting communication channels The use of layout values in network design and their protectionIdentity and Access Management
Physical and logical access to assets Identification and authentication integrating third-party identification services with identity as a service Authorization mechanisms The identity and access provisioning lifecycleSecurity Assessment and Testing
Vulnerability assessment and penetration testing Disaster recovery Business continuity plans Awareness training for clientsSecurity Operations
Understanding and supporting investigations Requirements for investigation types Logging and monitoring activities Securing the provision of resources Foundational security operations concepts Applying resource protection techniques Incident management Disaster recovery Managing physical security Business continuitySoftware Development Security
Examining hazard evaluation Detecting weaknesses in source codes