The aims and scope of "Advances in
Knowledge-Based Systems, Data Science, and Cybersecurity" are but not limited to:
Topic 1 |
Topic 2 |
Topic 3 |
Topic 4 |
Topic 5 |
Topic 6 |
Access control |
AI |
AI and security |
AI in industry sectors |
AI security |
AI/machine learning in security |
AI-supported economy |
Advanced Statistics |
Android/iOS security |
Analytics |
Anti-virus and anti-hacker measures |
Applications relating to information forensics |
Applied computing |
Applied cryptography |
Artificial Intelligence Security |
Auditing and Intrusion Detection |
Authentication |
Authenticated Key Agreement Protocols |
Authetication and Access Control |
Bayesian/probabilistic methods |
Big Data Security and Privacy |
Big data analytics |
Big data processing |
Big data technologies |
Biometric applications security |
Biometrics |
Blockchain |
Blockchain & Smart Contract |
Blockchain Theory and Practice |
Blockchain security |
Business analytics |
Business intelligence |
Cloud Security |
Cloud computing |
Cognitive interaction |
Computer crime prevention/detection |
Computer physical security |
Computer science and security |
Computer vision |
Compliance |
Confidentiality protection |
Content protection |
Critical infrastructure protection |
Criminological research |
Cryptanalysis |
Cryptographic Algorithms |
Cryptographic Hardware and Embedded Systems |
Cryptography and Cryptology |
Cryptography and associated topics |
Cryptography and data protection |
Cyber Governance |
Cyber Law |
Cyber attacks |
Cyber policy |
Cyber security |
Cyber security education |
Cyber security in Cloud |
Cyber security in Internet of Things (IoT) |
Cyber threat analysis |
Cyber threat intelligence |
Cyber victimology and psychopathology |
Cyber warfare |
Cybercrime |
Cybercrime laws |
Cyber–Physical System Security |
Cyber–Physical Systems |
Cybersecurity |
Cybersecurity and Information Security |
Cybersecurity data analytics |
Cybersecurity training and curriculum research |
DDoS attacks |
Data Science Security |
Data analytics |
Data base security |
Data capture and storage |
Data-driven innovation |
Data integration and privacy |
Data loss prevention (DLP) |
Data mining |
Data mining in healthcare |
Data mining in security |
Data visualization |
Data warehousing |
Database and data security |
Database Security |
Decision making |
Decision support |
Denial of service protection |
Descriptive Statistics |
Digital Forensics & Security |
Digital and Information Forensics |
Digital forensics |
Digital forensics and law enforcement investigation |
Digital fraud |
Digital rights |
Digital transformation |
Distributed file systems |
Distributed systems |
E-Business Security |
E-Health Security |
Edge computing |
Electronic commerce |
Electronic government |
Emerging technologies |
Emerging trends in cyber security |
Encryption |
Espionage |
Ethics in AI |
Evidence theory |
Expert columns |
Finance and risk analytics |
Financial fraud |
Firewalls |
Formal Methods in Information Security |
Formal methods in information security |
Forensic informatics |
Foundations |
Foundations of Cryptology |
Focuses on cyber conflict |
Foundational and philosophical aspects of information
security |
Graph analytics |
Hardware security |
High-performance computing |
Human Factors in Cyber Security |
Human Factors in Security |
Human factors and psychology |
Human–computer interaction |
HCI |
IDS |
IoT Security |
Identification |
Identity theft |
Incident forensics |
Incident Response |
Inferential Statistics |
Information ethics |
Information Hiding (Steganography, Watermarking, ...) |
Information retrieval |
Information science and security |
Information security |
Information systems |
Information warfare |
Infrastructure security |
Insider threats |
Intelligent decision support |
Intelligent information retrieval |
Intelligent processing |
Intelligent Transportation Systems (ITS) |
Internet fraud |
Internet of Things (IoT) security |
Internet security |
Intrusion detection |
Intrusion detection and prevention |
Intrusion detection systems and firewall |
IoT security |
IoT security trends |
IT Governance |
Key generation and key distribution schemes |
Knowledge discovery |
Knowledge engineering |
Knowledge graphs |
Knowledge-based systems |
Legal aspects of information security |
Legal frameworks |
Legal/cyber-risk/digital forensics |
Logical |
Logical and philosophical aspects of security |
Machine Learning |
Machine Learning in Security |
Machine learning algorithms |
Machine learning mechanisms for cyber security |
Malware |
Malware analysis |
Malware and botnet detection |
Marketing and retail analytics |
Methodological |
Mobility |
Modern tools for improving cyber security |
Multimedia & mobile security |
Natural Language Processing (NLP) |
Network Security |
Network and critical infrastructure security |
Network and Data Security |
NLP and text analytics |
Ontology |
Operating Systems Security |
Optimization |
OS security |
Pattern recognition |
Pervasive computing security |
Phishing |
Phishing defenses |
Philosophical aspects of information security |
Policies |
Policy |
Policy development |
Political and policy perspectives |
Privacy |
Privacy and Anonymity |
Privacy and Cyber Threat |
Privacy-enhancing technologies |
Privacy-enhancing technologies and anonymity |
Protocols |
QoS and business models |
Quantum Cryptography |
Quantum Security |
Quantum-safe digital signature schemes |
Quantum-safe encryption |
Quantum-safe encryption algorithms |
Quantum-safe key management mechanisms |
Ransomware |
Recommender systems |
Risk Management |
Risk management |
Safety-critical systems |
Scalable storage systems |
Secure communications technology and computer systems |
Secure end systems |
Secure operating systems |
Secure software development |
Secure Software Development / Software Security |
Security |
Security agents |
Security control measures, policy models and
authentication |
Security economics |
Security evaluation |
Security infrastructures |
Security issues in Intelligent Transportation Systems
(ITS) |
Security modelling |
Security Protocols |
Security Risk and Engineering |
Security training |
SIEM systems |
Smart cities |
Social and geographic dimensions of cyber offending |
Social media abuse detection |
Social media analysis |
Software and hardware security architectures |
Software protection |
Software/system security |
Software/hardware security |
Spoofing protection |
Statistical foundations |
Steganography and Secure Communication |
Strategy and international relations |
Strategic cyber threats |
Surveillance and systems applications |
Supply chain and logistics analytics |
System security |
Tamper resistant software |
Telecommunications |
Telecommunication security |
Text analytics |
Threat detection/protection |
Threat intelligence summaries |
Trends of crime |
Trust and safety |
Uncertainty modeling |
Virus/worm controls |
Vulnerabilities (Modeling, Analysis, ...) |
Web and social media analytics |
Wireless/mobile network and data security |