Schedule for Keynote Sessions and Technical Sessions

Track Details

Track details

ReDCySec invites original contribution which has not been published or communicated anywhere else, to this blind and peer reviewed conference. Accepted papers will be submitted for inclusion in Springer Proceedings subject to meeting Springer’s scope and quality requirements. The tracks for the conference are the following but not limited to:

  • Privacy and Secrecy of InformationFairness in algorithm and privacy protection, Data Security and Privacy, Web Security and Privacy, Vulnerability analysis, effects of darkweb.
  • Cryptography: development and analysis Cryptographic protocols, Lightweight Cryptography, Security Challenges in IoT and Resource Constrained Devices, Cloud Security, Identity and attribute based encryption, homomorphic encryption.
  • Cyber Threat Intelligence and mitigation Intrusion Detection and Prevention System, Security in Cyber Physical Systems, security issues in industry 5.0, Development of CTI Frameworks, Digital Forensics, Malware Analysis, characterising actionable threat intelligence.
  • Quantum Cryptography Quantum Resistant Cryptography, Quantum key distribution, Quantum Random Number Generation, quantum safe algorithms.
  • Developments and Applications of Blockchain Technology Application in healthcare, finance, governance etc.
  • Role of AI & ML in Cyber Security Threat Detection, Cyber Threat Intelligence. Deep fake algorithms, accelerated detection and response, endpoint security, Cyber Security automation and Threat Intelligence Sharing.
  • Security Policies, audit and assurance Policy auditing and assurance, risk analysis, security privacy policies and standard, access management process, asset monitoring processes, and governance, risk and compliance (GRC) .

For Further Info/Queries