• Distributed and Pervasive Systems Security
• Enterprise Systems Security
• Formal Methods Application in Security
• Hardware-Based security
• Incident Handling and Penetration Testing
• Legal Issues
• Multimedia and Document Security
• Operating Systems and Database Security
• Privacy issues
• Secure Software Development, Architecture and Outsourcing
• Security for Future Networks
• Security in Cloud Computing
• Security in Social Networks
• Security of Web-based Applications and Services
• Security protocols
• VOIP, Wireless and Telecommunications Network Security
• SCADA and Embedded systems security
• Anti-cyberterrorism
• Anti-Forensics and Anti-Anti-Forensics Techniques
• Cyber-Crimes
• Data leakage, Data protection and Database forensics
• Evidentiary Aspects of Digital Forensics
• Executable Content and Content Filtering
• File System and Memory Analysis Multimedia Forensic
• Forensics of Virtual and Cloud Environments
• Information Hiding
• Investigation of Insider Attacks
• Large-Scale Investigations
• Malware forensics and Anti-Malware techniques
• New threats and Non-Traditional approaches
• Network Forensics and Traffic Analysis
• Hardware Vulnerabilities and Device Forensics
• Computer Forensics
• Business Continuity & Disaster Recovery Planning
• Corporate Governance
• Critical Infrastructure Protection
• Decidability and Complexity
• Digital Rights Management and Intellectual Property Protection
• Economics of Security
• Fraud Management
• Identity Management
• Laws and Regulations
• Security Policies and Trust Management
• Threats, Vulnerabilities, and Risk Management
• Computer Crime Prevention and Detection
• Authentication and Access Control Systems
• Biometrics Applications
• Biometrics standards and standardization
• Cyber Peacefare Trends and Approaches
• Electronic Passports, National ID and Smart Card Security
• New theories and algorithms in biometrics
• Social engineering
• Surveillance Systems
• Template Protection and Liveliness detection
• Computer Security
• Confidentiality Protection
• Cryptography and Data Protection
• Forensics, Recognition Technologies and Applications
• Network Security
• Security; Authentication and Cryptography for Wireless Networks