We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Security and Privacycryptography cybersecurity supply chain risk management general security & privacy identity & access management access authorization access control authentication Personal Identity Verification public key infrastructure privacy risk management security & behavior security measurement security programs & operations systems security engineering zero trust
Technologiesartificial intelligence big data biometrics blockchain cloud & virtualization combinatorial testing complexity hardware mobile networks quantum information science servers smart cards software & firmware storage
Applicationscommunications & wireless cyber-physical systems cybersecurity education cybersecurity framework cybersecurity workforce enterprise forensics industrial control systems Internet of Things mathematics positioning navigation & timing small & medium business telework voting
Laws and Regulationsexecutive documents Comprehensive National Cybersecurity Initiative Cybersecurity Strategy and Implementation Plan Cyberspace Policy Review Executive Order 13636 Executive Order 13702 Executive Order 13718 Executive Order 13800 Executive Order 13905 Executive Order 14028 Federal Cybersecurity Research and Development Strategic Plan Homeland Security Presidential Directive 7 Homeland Security Presidential Directive 12 OMB Circular A-11 OMB Circular A-130 laws Cyber Security R&D Act Cybersecurity Enhancement Act E-Government Act Energy Independence and Security Act Federal Information Security Modernization Act First Responder Network Authority Health Insurance Portability and Accountability Act Help America Vote Act Internet of Things Cybersecurity Improvement Act regulations
Activities and Productsannual reports conferences & workshops reference materials standards development
Sectorsaerospace energy financial services healthcare hospitality manufacturing public safety retail telecommunications transportation