We solicit original papers including but not limited to:
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Applied Cryptography
Authentication
Biometric Security
Complex Systems Security
Database and System Security
Data Protection
Web-Mining
Network analysis and mining
text mining
privacy protection data mining
graph pattern mining