Notification and Preliminary Call for Papers
The objectives of the ICITST-2025 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2025 invite research papers that encompass conceptual analysis, design implementation and performance evaluation.
The topics in ICITST-2025 include but are not confined to the following areas:
Artificial Intelligence
- Biometrics
- Computational Intelligence
- Data Mining
- Deep Learning
- Expert Systems
- Fuzzy Logic
- Natural Language Processing
- Neural Networks
- Neuromorphic systems
- Sentiment Analysis
Cyber Security and Cyber warfare
- Surveillance Systems
- Cyber Warfare Trends and Approaches
- Social engineering
- Template Protection and Liveliness detection
- New theories and algorithms in biometrics
- Formal Methods Application in Security
- Operating Systems and Database Security
- Enterprise Systems Security
- SCADA and Embedded systems security
- Distributed and Pervasive Systems Security
- Secure Software Development
- Situational Awareness Assessments
- Social Media Analysis
- Collaborative Defense Approach
- Risk Management, Governance and Compliance
- Cyber Situational Awareness Tools & Techniques
- Network Situational Awareness
- National and Critical Infrastructure Security Issues
- Situation Awareness in Military Operations
Ethical Hackers
- Ethical Hackers
- Ethical Hacking Methodology
- Fingerprint and Enumerate Targets
- Network Scanning and Sniffing
- Pre-attack Reconnaissance
- Preventing Cyber Attacks
- Unethical Hacker
- Vulnerability Assessments
- Vectors Attack
- Web Attacks (XSS, Directory Traversals and SQL Injection)
Internet Applications and Technology
- Internet Technologies
- Internet Architecture
- Internet of Things (IoT)
- Broadband Access Technologies
- Application Agents
- Boundary Issues of Internet Security
- Database Management
- Data Models for Production Systems and Services
- Artificial Intelligence and Expert Systems
- IPSec Quality of Service
- Knowledge Management
- Embedded Systems
- Defence Systems
Robotics
- Assistive Robots
- Autonomous Robots
- Human-Robot Interaction
- Humanoid Robots
- Mobile Robots
- Robotic Automation
- Robot Localization and Map Building
- Space and underwater robots
- Telerobotics
- Walking and Climbing Robots
Security of Social Media Platforms
- Characteristics and Trends
- Control and Hybrid Systems
- Data Portability and Management
- Design Challenges
- Integrated Tool Chains
- Modeling of Distributed Real-Time Software
- Mobile Cyber-Physical Systems
- New Paradigms
- Realtime Communications and Instant Messaging
- Security of Social Media
- Sensor and Mobile Networks
- Social Media Applications
- Social Medial Big Data Analysis
- Social Media Technologies
- Social Network Analysis
- Trust and Privacy in Social Media
- Wearables
- Web Analytics
Cloud Security
- Secure Virtual Infrastructure and Private Cloud
- Cryptographic Enforcement of Multi-Tenancy
- Cloud Requirements for PaaS and SaaS
- Security Policy and Privacy Requirements
- CloudAudit Protocol
- Corporate Governance
- Laws and Regulations
- Threats, Vulnerabilities, and Risk Management
- Disaster Recovery Planning
- Critical Infrastructure Protection
- Digital Rights Management
- Security Policies and Trust Management
- Identity Management
Digital Crypto-Currencies
- Bitcoin
- Challenges and its Roadmap
- Crypto-Assets
- Current State of Privacy in Bitcoin
- Decentralised Technology
- Data Licensing
- Digital Currencies
- Fintechs
- Future Payment Implications
- Standardisation-Related Issues
- Technical, Business and Regulatory Aspects
- Technology-based Risks
Infonomics and e-Technology
- Infonomics
- Information Visualization
- Information Management
- Information Quality
- Technology-Enabled Information
- e-Learning
- e-Commerce
- e-Business
- e-Government
- e-Society
- System Design and Security for e-Services
- Synchronizing e-Security
- Capabilities for Enterprise Fraud Management
- Transactional Fraud
- Endpoint Transactional Monitoring
- Web Fraud Detection
- Database Security
- Application Security
- Border Protection and Controls
Machine Vision
- Augmented/Virtual Reality
- Brain-Machine Interface
- Geographic Information Systems
- Human Computer Interaction
- Image/Video Processing
- Intrusion Detection
- Medical Diagnosis
- Pattern Recognition
- Segmentation Techniques
- Signal Processing
Secured Transactions
- End-to-End Encryption
- Incentives in Networked Systems
- Malware and Ransomware Targeting Networked Systems
- Networked System Architecture and Protocols
- Networked System Services and Applications
- Networed System Security, Privacy and Trust
- Offensive Security for Networked Systems
- Reverse Engineering
- Rootkit and Bootkit Targeting Networked Systems
- Security Vulnerabilities in Networked Systems
Ubi/Cloud Computing
- Big Data
- Data Protection in Ubi/Cloud Computing
- Context-Awareness and its Data Mining for UbiCom
- Data Grids
- Distributed Information Systems
- HCI and Interaction for UbiCom
- Ubiquitous Systems
- USN/RFID Service
- Smart Homes and its Business Model for UbiCom Service
- Security and Data Management for UbiCom
- Peer to Peer Data Management
- Application for Ubi/Cloud Computing
- Mobile Devices
Cyber-Physical Systems
- Automation Systems Engineering
- Control and Hybrid Systems
- Cyber-Physical Production Management
- Cyber-Physical Production Systems Design and Optimization
- Data Portability and Management
- Embedded Devices
- Graphs, Algorithms and Disambiguation in Semantic Search
- Hardware Cryptography
- High-Assurance Cryptography
- Industry 4.0 and Innovative Manufacturing Techniques
- Internet of Things
- Manufacturing Engineering and Technology
- Manufacturing Evolution
- Mobile Cyber-Physical Production Systems
- Model-Based Development of Cyber-Physical Systems
- Modelling and Analysis of Cyber-Physical Production Systems
- Production Planning and Control
- Real-Time Embedded Systems Abstractions
- Remote Robotic Assembly
- Robustness, Safety and Security of Cyber-Physical Systems
- Sensor and Mobile Networks
- Special Purpose Architectural Solution
- Symbiotic Cyber-Physical Networks
- Verification, Validation and Certification of Cyber-Physical Systems
Digital Forensics
- Data leakage and Database Forensics
- Forensics of Virtual and Cloud Environments
- Network Forensics and Traffic Analysis
- Information Hiding and Fraud Management
- File System and Memory Analysis
- Executable Content and Content Filtering
- Anti-Forensics Techniques
- Malware Forensics
- Evidentiary Aspects of Digital Forensics
- Large-Scale Investigations
- New threats and Non-Traditional Approaches
- Incident Handling and Penetration Testing
- Economics of Security
Information Security
- Collaborative Learning
- Trust, Privacy and Data Security
- Network Security Issues and Protocols
- Security Challenges and Content Authoring
- Cryptography
- Secure Communications
- Authentication Techniques
- Chaos-based Data Security
- MANET Security
- Wireless Sensor Network Security
- Security Policy Formulation and Implementations
- Digital Forensics and Crimes
- Biometrics
- Security Incident Analysis
- Security Information Visualisation
- Big Data
- Open Source Applications
- Interoperability
- Decidability and Complexity
Multimedia and Web Services
- DIntelligent Multimedia
- Multimedia Information Systems
- Multimedia Security
- Web Databases
- Web Metrics and its Applications
- Web Mining and Web Intelligence
- Web Services
- XML and other extensible languages
- Semantic Web and Ontology
- Intelligent Learning and Teaching Systems
- Large-Scale Enterprise Design Architecture
- Resource Management
Security in Machine Learning
- Adversarial Machine Learning
- Attack and Defense of Face Recognition Systems
- Attacks and Defense of Voice Recognition and Voice Commanded Systems
- Attacks and Defense of Machine learning Algorithms in Program Analysis
- Detection and Defense to Training Data Set Poison Attack
- Malware Identification and Analysis
- Privacy Preserving Machine Learning
- Robustness Analysis of Machine Learning Algoritms
- Spam and Phshing Email Detection
- Vulnerability Analysis
- Watermarking of Machine Learning Algorithms and Systems
Wireless and Sensor Networks
- Wireless Networking and Communication
- WiFi Protocols and Standards
- Trends in Wireless Communications
- Wireless Security Standards and Mechanisms
- Sensor Networks (Sensornet)
- Ad hoc wireless Sensor Networks
- Security of Sensor Networks and Protocols
- Operations of Sensor Networks
- RFID / USN Key Update Mechanisms
- Quality of Service
Young Researchers Contributions
ICITST-2024 welcome ongoing research from undergraduates, graduates/postgraduates and professionals.