Topics
Technology Fields:
• Adaptive methods
• Anti-tamper technologies
• Autonomous systems
• Behavioral biometrics
• Bio-inspired technologies
• Cancelable biometrics
• Cognitive biometrics
• Compressive sampling
• Computer vision
• Cryptography
• Decision-making systems
• Detection and tracking
• Detectors and sensors
• Distributed computing
• Encryption ciphers
• Forensics
• Formal verification
• Intelligent Systems
• Machine learning
• Mobile hotspots
• Modeling and simulation
• Multi-spectral processing
• Pattern recognition and classification techniques
• Physiological biometrics
• Prediction techniques
• Probabilistic methods
• Reverse engineering
• Secure dedicated ASIC
• Secure FPGA
• Sensor and information fusion
• Soft-computing methods
• Steganography
• System engineering
• Trusted ICs
Application Areas:
• Air and space security
• Crime detection and prevention
• Critical infrastructure systems
• Cyber-physical security
• Cyberspace security
• Data center virtualization
• Decision support systems
• Detection and prevention of identity theft
• Digital rights management
• Distributed authentication
• Early warning systems
• Embedded security
• Emergency response systems
• Financial systems
• Geographical information systems (GIS)
• Grid and cloud computing
• Human-centric systems ID and biometric security
• Information hiding
• IP protection
• Intrusion detection
• Medical devices
• Mobile computing and infotainment systems
• P2P commerce
• Perimeter, border and homeland security
• Personal and legal records management
• Public utilities and transit
• Remote sensing, monitoring, surveillance
• Tele-healthcare
• Training systems
• Wireless security
Topics