Notification and Preliminary Call for Papers

The objectives of the ICITST-2025 are to bridge the knowledge gap between academia and industry, promote research esteem in secured Internet transactions and the importance of information technology evolution to secured transactions. The ICITST-2025 invite research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in ICITST-2025 include but are not confined to the following areas:

Artificial Intelligence
  • Biometrics
  • Computational Intelligence
  • Data Mining
  • Deep Learning
  • Expert Systems
  • Fuzzy Logic
  • Natural Language Processing
  • Neural Networks
  • Neuromorphic systems
  • Sentiment Analysis
Cyber Security and Cyber warfare
  • Surveillance Systems
  • Cyber Warfare Trends and Approaches
  • Social engineering
  • Template Protection and Liveliness detection
  • New theories and algorithms in biometrics
  • Formal Methods Application in Security
  • Operating Systems and Database Security
  • Enterprise Systems Security
  • SCADA and Embedded systems security
  • Distributed and Pervasive Systems Security
  • Secure Software Development
  • Situational Awareness Assessments
  • Social Media Analysis
  • Collaborative Defense Approach
  • Risk Management, Governance and Compliance
  • Cyber Situational Awareness Tools & Techniques
  • Network Situational Awareness
  • National and Critical Infrastructure Security Issues
  • Situation Awareness in Military Operations
Ethical Hackers
  • Ethical Hackers
  • Ethical Hacking Methodology
  • Fingerprint and Enumerate Targets
  • Network Scanning and Sniffing
  • Pre-attack Reconnaissance
  • Preventing Cyber Attacks
  • Unethical Hacker
  • Vulnerability Assessments
  • Vectors Attack
  • Web Attacks (XSS, Directory Traversals and SQL Injection)
Internet Applications and Technology
  • Internet Technologies
  • Internet Architecture
  • Internet of Things (IoT)
  • Broadband Access Technologies
  • Application Agents
  • Boundary Issues of Internet Security
  • Database Management
  • Data Models for Production Systems and Services
  • Artificial Intelligence and Expert Systems
  • IPSec Quality of Service
  • Knowledge Management
  • Embedded Systems
  • Defence Systems
Robotics
  • Assistive Robots
  • Autonomous Robots
  • Human-Robot Interaction
  • Humanoid Robots
  • Mobile Robots
  • Robotic Automation
  • Robot Localization and Map Building
  • Space and underwater robots
  • Telerobotics
  • Walking and Climbing Robots
Security of Social Media Platforms
  • Characteristics and Trends
  • Control and Hybrid Systems
  • Data Portability and Management
  • Design Challenges
  • Integrated Tool Chains
  • Modeling of Distributed Real-Time Software
  • Mobile Cyber-Physical Systems
  • New Paradigms
  • Realtime Communications and Instant Messaging
  • Security of Social Media
  • Sensor and Mobile Networks
  • Social Media Applications
  • Social Medial Big Data Analysis
  • Social Media Technologies
  • Social Network Analysis
  • Trust and Privacy in Social Media
  • Wearables
  • Web Analytics
Cloud Security
  • Secure Virtual Infrastructure and Private Cloud
  • Cryptographic Enforcement of Multi-Tenancy
  • Cloud Requirements for PaaS and SaaS
  • Security Policy and Privacy Requirements
  • CloudAudit Protocol
  • Corporate Governance
  • Laws and Regulations
  • Threats, Vulnerabilities, and Risk Management
  • Disaster Recovery Planning
  • Critical Infrastructure Protection
  • Digital Rights Management
  • Security Policies and Trust Management
  • Identity Management
Digital Crypto-Currencies
  • Bitcoin
  • Challenges and its Roadmap
  • Crypto-Assets
  • Current State of Privacy in Bitcoin
  • Decentralised Technology
  • Data Licensing
  • Digital Currencies
  • Fintechs
  • Future Payment Implications
  • Standardisation-Related Issues
  • Technical, Business and Regulatory Aspects
  • Technology-based Risks
Infonomics and e-Technology
  • Infonomics
  • Information Visualization
  • Information Management
  • Information Quality
  • Technology-Enabled Information
  • e-Learning
  • e-Commerce
  • e-Business
  • e-Government
  • e-Society
  • System Design and Security for e-Services
  • Synchronizing e-Security
  • Capabilities for Enterprise Fraud Management
  • Transactional Fraud
  • Endpoint Transactional Monitoring
  • Web Fraud Detection
  • Database Security
  • Application Security
  • Border Protection and Controls
Machine Vision
  • Augmented/Virtual Reality
  • Brain-Machine Interface
  • Geographic Information Systems
  • Human Computer Interaction
  • Image/Video Processing
  • Intrusion Detection
  • Medical Diagnosis
  • Pattern Recognition
  • Segmentation Techniques
  • Signal Processing
Secured Transactions
  • End-to-End Encryption
  • Incentives in Networked Systems
  • Malware and Ransomware Targeting Networked Systems
  • Networked System Architecture and Protocols
  • Networked System Services and Applications
  • Networed System Security, Privacy and Trust
  • Offensive Security for Networked Systems
  • Reverse Engineering
  • Rootkit and Bootkit Targeting Networked Systems
  • Security Vulnerabilities in Networked Systems
Ubi/Cloud Computing
  • Big Data
  • Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • HCI and Interaction for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Peer to Peer Data Management
  • Application for Ubi/Cloud Computing
  • Mobile Devices
Cyber-Physical Systems
  • Automation Systems Engineering
  • Control and Hybrid Systems
  • Cyber-Physical Production Management
  • Cyber-Physical Production Systems Design and Optimization
  • Data Portability and Management
  • Embedded Devices
  • Graphs, Algorithms and Disambiguation in Semantic Search
  • Hardware Cryptography
  • High-Assurance Cryptography
  • Industry 4.0 and Innovative Manufacturing Techniques
  • Internet of Things
  • Manufacturing Engineering and Technology
  • Manufacturing Evolution
  • Mobile Cyber-Physical Production Systems
  • Model-Based Development of Cyber-Physical Systems
  • Modelling and Analysis of Cyber-Physical Production Systems
  • Production Planning and Control
  • Real-Time Embedded Systems Abstractions
  • Remote Robotic Assembly
  • Robustness, Safety and Security of Cyber-Physical Systems
  • Sensor and Mobile Networks
  • Special Purpose Architectural Solution
  • Symbiotic Cyber-Physical Networks
  • Verification, Validation and Certification of Cyber-Physical Systems
Digital Forensics
  • Data leakage and Database Forensics
  • Forensics of Virtual and Cloud Environments
  • Network Forensics and Traffic Analysis
  • Information Hiding and Fraud Management
  • File System and Memory Analysis
  • Executable Content and Content Filtering
  • Anti-Forensics Techniques
  • Malware Forensics
  • Evidentiary Aspects of Digital Forensics
  • Large-Scale Investigations
  • New threats and Non-Traditional Approaches
  • Incident Handling and Penetration Testing
  • Economics of Security
Information Security
  • Collaborative Learning
  • Trust, Privacy and Data Security
  • Network Security Issues and Protocols
  • Security Challenges and Content Authoring
  • Cryptography
  • Secure Communications
  • Authentication Techniques
  • Chaos-based Data Security
  • MANET Security
  • Wireless Sensor Network Security
  • Security Policy Formulation and Implementations
  • Digital Forensics and Crimes
  • Biometrics
  • Security Incident Analysis
  • Security Information Visualisation
  • Big Data
  • Open Source Applications
  • Interoperability
  • Decidability and Complexity
Multimedia and Web Services
  • DIntelligent Multimedia
  • Multimedia Information Systems
  • Multimedia Security
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining and Web Intelligence
  • Web Services
  • XML and other extensible languages
  • Semantic Web and Ontology
  • Intelligent Learning and Teaching Systems
  • Large-Scale Enterprise Design Architecture
  • Resource Management
Security in Machine Learning
  • Adversarial Machine Learning
  • Attack and Defense of Face Recognition Systems
  • Attacks and Defense of Voice Recognition and Voice Commanded Systems
  • Attacks and Defense of Machine learning Algorithms in Program Analysis
  • Detection and Defense to Training Data Set Poison Attack
  • Malware Identification and Analysis
  • Privacy Preserving Machine Learning
  • Robustness Analysis of Machine Learning Algoritms
  • Spam and Phshing Email Detection
  • Vulnerability Analysis
  • Watermarking of Machine Learning Algorithms and Systems
Wireless and Sensor Networks
  • Wireless Networking and Communication
  • WiFi Protocols and Standards
  • Trends in Wireless Communications
  • Wireless Security Standards and Mechanisms
  • Sensor Networks (Sensornet)
  • Ad hoc wireless Sensor Networks
  • Security of Sensor Networks and Protocols
  • Operations of Sensor Networks
  • RFID / USN Key Update Mechanisms
  • Quality of Service

Young Researchers Contributions

ICITST-2024 welcome ongoing research from undergraduates, graduates/postgraduates and professionals.