TopicsTopicsTechnology areas:o Adaptive methods o Anti-tamper technologies o Autonomous systems o Behavioral biometrics o Bio-inspired technologies o Cancelable biometrics o Cognitive biometrics o Compressive sampling o Computer vision o Cryptography o Decision-making systems o Detection and tracking o Detectors and sensors o Distributed computing o Encryption ciphers o Forensics o Formal verification o Intelligent Systems o Machine learning o Mobile hotspots o Modeling and simulation o Multi-spectral processing o Pattern recognition and classification techniques o Physiological biometrics o Prediction techniques o Probabilistic methods o Reverse engineering o Secure dedicated ASIC o Secure FPGA o Sensor and information fusion o Soft-computing methods o Steganography o System engineering o Trusted ICsApplication areas:o Air and space securityo Crime detection and prevention o Critical infrastructure systems o Cyber-physical security o Cyberspace security o Data center virtualization o Decision support systems o Detection and prevention of identity theft o Digital rights management o Distributed authentication o Early warning systems o Embedded security o Emergency response systems o Financial systems o Geographical information systems (GIS) o Grid and cloud computing o Human-centric systems ID and biometric security o Information hiding o IP protection o Intrusion detection o Medical devices o Mobile computing and infotainment systems o P2P commerce o Perimeter, border and homeland security o Personal and legal records management o Public utilities and transit o Remote sensing, monitoring, surveillance o Tele-healthcare o Training systems o Wireless security