Call for Papers
ISCS provides a platform for researchers, scientists and academia from Cyber Security and AIML to meet and exchange ideas, collaborate and work together. It also proposes to focus on all aspects of Information Security, Cryptography and Risk analysis with modern and emerging network security techniques.
Topics of interest include but are not limited to:
Track 1- AI and Machine Learning for Cybersecurity
Track 1- AI and Machine Learning for Cybersecurity
- Machine Learning Models for Intrusion Detection
- Behavioral Analysis and Anomaly Detection with AI
- Deep Learning for Malware Detection
- Natural Language Processing in Threat Intelligence
- AI-Driven Security Information and Event Management (SIEM)
- Explainable AI in Cybersecurity
- Adversarial Machine Learning in Evasion Attacks
- Predictive Analytics for Cyber Threat Forecasting
- Machine Learning for Secure User Authentication
- AI-Enhanced Security Operations Centers (SOCs)
- IoT Device Authentication and Access Control
- Edge Computing Security Frameworks
- Threat Detection in Industrial IoT (IIoT)
- Privacy and Compliance in IoT Environments
- Secure Firmware and Software Updates for IoT
- Cloud-Native Security Solutions
- Identity and Access Management in Cloud Environments
- Cloud Workload Protection Platforms (CWPP)
- Security Implications of Serverless Computing
- Data Encryption and Access Control in Cloud Services
- Quantum-Safe Cryptographic Algorithms
- Quantum Cryptanalysis
- Quantum-safe Implementation and Standardization
- Quantum Key Distribution (QKD) for Secure Communication
- Quantum-Resistant Blockchain Solutions
- Cryptographic Protocols for Quantum Networks
- Quantum-Secure Data Storage
- Post-Quantum Cryptography Implementations
- Quantum-Safe Public Key Infrastructure (PKI)
- Quantum-Resistant Authentication Methods
- Challenges in Quantum Cryptanalysis
- Quantum-Secure Cloud Computing
- Smart Contracts and Security Audits
- Machine Learning for Blockchain Anomaly Detection
- Decentralized Identity Management on the Blockchain
- Privacy-Preserving Techniques in Blockchain
- Transactions Blockchain for Supply Chain Security
- Cryptocurrencies and Wallet Security
- Consensus Algorithms in Secure Decentralized Networks
- Machine Learning in Blockchain Analytics
- Cross-Chain Interoperability and Security
- Secure Tokenization and Asset Management on the Blockchain
- Zero-Day Vulnerabilities and Exploit Prevention
- AI-Generated Cyber Threats and Countermeasures
- Threats to Critical Infrastructure Security
- Ethical Hacking and Penetration Testing
- Human Factors in Cybersecurity Awareness
- Incident Response and Cyber Forensics
- Privacy and Data Protection Regulations
- Cybersecurity Workforce Development and Training
- Security Challenges in Emerging Technologies
- Collaborative Threat Intelligence and Sharing