dow
News Updates

Topics for Submission

Following are the topics for submission but not limited to

  • Information Security Governance
  • Information Security Culture
  • Information Security Standards
  • Information Security Audit
  • Information Security Management
  • Information Security Information Regulations
  • Privacy Enhancing Technologies
  • Privacy Engineering
  • Biometrics
  • Access control
  • Authentication
  • Steganography
  • Applied cryptography
  • Information Hiding & Watermarking
  • Intrusion detection & Prevention
  • Network security
  • Peer to Peer security
  • Privacy secure group communications
  • Critical infrastructure security
  • Critical Security Controls
  • Database security
  • Data protection
  • Data / System integrity
  • Key management
  • Lightweight crypto and security
  • Vulnerability analysis
  • Denial-of-Service attacks
  • Smart Device security
  • Wireless sensor network security
  • Formal methods for security
  • Hardware-based security and applications
  • Malware and botnets
  • Mobile computing security
  • Network security
  • Risk Assessment and Auditing
  • Permissions and User Rights
  • Auditing and Automation
  • Operating system security
  • Computer Security Policies
  • Contingency and Continuity Planning
  • Password Management
  • Attack Strategies and Methods
  • Computer forensics
  • Honeypots
  • Security Essentials
  • Privacy, security, ethical, and social issues
  • Cyber law, E-commerce Law, and Intellectual property rights
  • Change Management
  • Big data security and privacy
  • Cloud computing security
  • Cyber-physical security
  • Cyber Security Standards
  • Digital Right Management
  • Intelligence environments
  • Information dissemination control
  • Industrial control system security
  • Economics of security and privacy
  • Electronic frauds
  • Web Security
  • Web Penetration Testing & Ethical Hacking
  • Firewalls and Perimeters
  • Security in Mobile ad hoc networks (MANETs)
  • Security in information flow
  • Security and privacy of the Internet of Things
  • Security Cloud computing
  • Security in location services
  • Security and privacy in social networks
  • Security and privacy in pervasive and ubiquitous computing
  • Security of e-Commerce, e-Business and e-Government

And other related areas.


ICAITM 2017

Venue:

Monrovia, Liberia

Date:

13th & 14th December 2017 – Workshop for CIO’s and ICT Managers.

15th December 2017: Conference.

16th December 2017: Plenary Sessions for paper presentations.

Time:

09.00 AM – 05.00 PM

Partners / Technical Speakers from: