Notification and Preliminary Call for Papers

The objectives of the ICITST-2018 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2018 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2018 include but are not confined to the following areas:


Cyber Security and Cyber warfare

  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • nterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development
  • Situational Awareness Assessments
  • Social Media Analysis
  • Collaborative Defense Approach
  • Risk Management, Governance and Compliance
  • Cyber Situational Awareness Tools & Techniques
  • Network Situational Awareness
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations

Internet Applications and Technology

  • Internet Technologies
  • Internet Architecture
  • Internet of Things (IoT)
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Artificial Intelligence and Expert Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Embedded Systems
  • Defence Systems

Multimedia and Web Services

  • DIntelligent Multimedia
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining and Web Intelligence
  • Web Services
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Intelligent Learning and Teaching Systems
  • Large-Scale Enterprise Design Architecture
  • Resource Management

Infonomics and e-Technology

  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security
  • Capabilities for Enterprise Fraud Management
  • Transactional Fraud
  • Endpoint Transactional Monitoring
  • Web Fraud Detection
  • Database Security
  • Application Security
  • Border Protection and Controls

Cloud Security

  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management

Ubi/Cloud Computing

  • Big Data
  • Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • HCI and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Peer to Peer Data Management
  • Application for Ubi/Cloud Computing
  • Mobile Devices

Information Security

  • Collaborative Learning
  • Trust, Privacy and Data Security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Cryptography
  • Secure Communications
  • Authentication Techniques
  • Chaos-based Data Security
  • MANET Security
  • Wireless Sensor Network Security
  • Security Policy Formulation and Implementations
  • Digital Forensics and Crimes
  • Biometrics
  • Security Incident Analysis
  • Security Information Visualisation
  • Big Data
  • Open Source Applications
  • Interoperability
  • Decidability and Complexity

Digital Forensics

  • Data leakage and Database Forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding and Fraud Management
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware Forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional Approaches
  • Incident Handling and Penetration Testing
  • Economics of Security

Wireless and Sensor Networks

  • Wireless Networking and Communication
  • WiFi Protocols and Standards
  • Trends in Wireless Communications
  • Wireless Security Standards and Mechanisms
  • Sensor Networks (Sensornet)
  • Ad hoc wireless Sensor Networks
  • Security of Sensor Networks and Protocols
  • Operations of Sensor Networks
  • RFID / USN Key Update Mechanisms
  • Quality of Service

Research in Progress

  • Ongoing and Collaborative Research, Future Technologies…

Young Researchers Contributions

ICITST wellcome ongoing research from undergraduates, graduates/postgraduates and professionals.