Notification and Preliminary Call for Papers

The objectives of the ICITST-2019 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2019 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2019 include but are not confined to the following areas:

Cyber Security and Cyber warfare
  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • nterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development
  • Situational Awareness Assessments
  • Social Media Analysis
  • Collaborative Defense Approach
  • Risk Management, Governance and Compliance
  • Cyber Situational Awareness Tools & Techniques
  • Network Situational Awareness
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations
Infonomics and e-Technology
  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security
  • Capabilities for Enterprise Fraud Management
  • Transactional Fraud
  • Endpoint Transactional Monitoring
  • Web Fraud Detection
  • Database Security
  • Application Security
  • Border Protection and Controls
Information Security
  • Collaborative Learning
  • Trust, Privacy and Data Security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Cryptography
  • Secure Communications
  • Authentication Techniques
  • Chaos-based Data Security
  • MANET Security
  • Wireless Sensor Network Security
  • Security Policy Formulation and Implementations
  • Digital Forensics and Crimes
  • Biometrics
  • Security Incident Analysis
  • Security Information Visualisation
  • Big Data
  • Open Source Applications
  • Interoperability
  • Decidability and Complexity
Ethical Hackers
  • Ethical Hackers
  • Ethical Hacking Methodology
  • Fingerprint and Enumerate Targets
  • Network Scanning and Sniffing
  • Pre-attack Reconnaissance
  • Preventing Cyber Attacks
  • Unethical Hacker
  • Vulnerability Assessments
  • Vectors Attack
  • Web Attacks (XSS, Directory Traversals and SQL Injection)
Research in Progress
  • Ongoing and Collaborative Research, Future Technologies…
Internet Applications and Technology
  • Internet Technologies
  • Internet Architecture
  • Internet of Things (IoT)
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Artificial Intelligence and Expert Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Embedded Systems
  • Defence Systems
Cloud Security
  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
Digital Forensics
  • Data leakage and Database Forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding and Fraud Management
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware Forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional Approaches
  • Incident Handling and Penetration Testing
  • Economics of Security
Blockchain
  • Applications of Blockchain
  • Blockchain in Video Games
  • Blockchain for Social Good
  • Blockchain Technology Developments
  • Consortium Blockchains
  • Cryptocurrencies
  • Decentralize Technologies
  • Digital Innovation
  • Financial Services
  • Fintech
  • Future of Cryptocurrencies
  • Private Blockchains
  • Public Blockchains
  • Security and Reliability in Blockchain
  • Smart Contracts
  • Smart Government and E-Voting
  • Smart Contracts
  • Supply Chain
Multimedia and Web Services
  • DIntelligent Multimedia
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining and Web Intelligence
  • Web Services
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Intelligent Learning and Teaching Systems
  • Large-Scale Enterprise Design Architecture
  • Resource Management
Ubi/Cloud Computing
  • Big Data
  • Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • HCI and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Peer to Peer Data Management
  • Application for Ubi/Cloud Computing
  • Mobile Devices
Wireless and Sensor Networks
  • Wireless Networking and Communication
  • WiFi Protocols and Standards
  • Trends in Wireless Communications
  • Wireless Security Standards and Mechanisms
  • Sensor Networks (Sensornet)
  • Ad hoc wireless Sensor Networks
  • Security of Sensor Networks and Protocols
  • Operations of Sensor Networks
  • RFID / USN Key Update Mechanisms
  • Quality of Service
Bitcoin
  • Challenges and its Roadmap
  • Crypto-Assets
  • Current State of Privacy in Bitcoin
  • Decentralised Technology
  • Data Licensing
  • Digital Currencies
  • Fintechs
  • Future Payment Implications
  • Standardisation-Related Issues
  • Technical, Business and Regulatory Aspects
  • Technology-based Risks

Young Researchers Contributions

ICITST welcome ongoing research from undergraduates, graduates/postgraduates and professionals.