Topics Technology Fields: • Adaptive methods   • Anti-tamper technologies • Autonomous systems • Behavioral biometrics • Bio-inspired technologies • Cancelable biometrics • Cognitive biometrics • Compressive sampling • Computer vision • Cryptography   • Decision-making systems • Detection and tracking   • Detectors and sensors • Distributed computing • Encryption ciphers     • Forensics     • Formal verification     • Intelligent Systems   Application Areas:  • Air and space security  • Crime detection and prevention   • Critical infrastructure systems • Cyber-physical security   • Cyberspace security   • Data center virtualization   • Decision support systems • Detection and prevention of identity  theft   • Digital rights management • Distributed authentication   • Early warning systems   • Embedded security   • Emergency response systems • Financial systems • Geographical information systems  (GIS)   Topics • Machine learning   • Mobile hotspots   • Modeling and simulation • Multi-spectral processing • Pattern recognition and     classification techniques • Physiological biometrics • Prediction techniques • Probabilistic methods • Reverse engineering • Secure dedicated ASIC   • Secure FPGA   • Sensor and   information fusion • Soft-computing methods • Steganography   • System engineering • Trusted ICs • Grid and cloud computing   • Human-centric systems ID   and biometric security   • Information hiding • IP protection   • Intrusion detection   • Medical devices   • Mobile computing      and infotainment systems • P2P commerce • Perimeter, border and      homeland security   • Personal and legal    records management • Public utilities and transit   • Remote sensing,   monitoring, surveillance • Tele-healthcare • Training systems • Wireless security