TopicsTechnology Fields:• Adaptive methods • Anti-tamper technologies • Autonomous systems • Behavioral biometrics • Bio-inspired technologies • Cancelable biometrics • Cognitive biometrics • Compressive sampling • Computer vision • Cryptography • Decision-making systems • Detection and tracking • Detectors and sensors • Distributed computing • Encryption ciphers • Forensics • Formal verification • Intelligent Systems Application Areas: • Air and space security • Crime detection and prevention • Critical infrastructure systems • Cyber-physical security • Cyberspace security • Data center virtualization • Decision support systems • Detection and prevention of identity theft • Digital rights management • Distributed authentication • Early warning systems • Embedded security • Emergency response systems • Financial systems • Geographical information systems (GIS) Topics• Machine learning • Mobile hotspots • Modeling and simulation • Multi-spectral processing • Pattern recognition and classification techniques • Physiological biometrics • Prediction techniques • Probabilistic methods • Reverse engineering • Secure dedicated ASIC • Secure FPGA • Sensor and information fusion • Soft-computing methods • Steganography • System engineering • Trusted ICs• Grid and cloud computing • Human-centric systems ID and biometric security • Information hiding • IP protection • Intrusion detection • Medical devices • Mobile computing and infotainment systems • P2P commerce• Perimeter, border and homeland security • Personal and legal records management • Public utilities and transit • Remote sensing, monitoring, surveillance • Tele-healthcare • Training systems • Wireless security