Topics
Topics
Technology areas:
o Adaptive methods
o Anti-tamper technologies
o Autonomous systems
o Behavioral biometrics
o Bio-inspired technologies
o Cancelable biometrics
o Cognitive biometrics
o Compressive sampling
o Computer vision
o Cryptography
o Decision-making systems
o Detection and tracking
o Detectors and sensors
o Distributed computing
o Encryption ciphers
o Forensics
o Formal verification
o Intelligent Systems
o Machine learning
o Mobile hotspots
o Modeling and simulation
o Multi-spectral processing
o Pattern recognition and classification techniques
o Physiological biometrics
o Prediction techniques
o Probabilistic methods
o Reverse engineering
o Secure dedicated ASIC
o Secure FPGA
o Sensor and information fusion
o Soft-computing methods
o Steganography
o System engineering
o Trusted ICs
Application areas:
o Air and space security
o Crime detection and prevention
o Critical infrastructure systems
o Cyber-physical security
o Cyberspace security
o Data center virtualization
o Decision support systems
o Detection and prevention of identity theft
o Digital rights management
o Distributed authentication
o Early warning systems
o Embedded security
o Emergency response systems
o Financial systems
o Geographical information systems (GIS)
o Grid and cloud computing
o Human-centric systems ID and biometric security
o Information hiding
o IP protection
o Intrusion detection
o Medical devices
o Mobile computing and infotainment systems
o P2P commerce
o Perimeter, border and homeland security
o Personal and legal records management
o Public utilities and transit
o Remote sensing, monitoring, surveillance
o Tele-healthcare
o Training systems
o Wireless security