11–12 September 2026  |  UPES Dehradun, Uttarakhand  | 
Sponsored by IEEE UP Section Conference Record #70668 conference_socs@ddn.upes.ac.in
ICACSDF 2026
UPES Logo IEEE UP Section Logo

Sponsored by IEEE UP Section Conference Record #70668

conference_socs@ddn.upes.ac.in
Themes & Topics • ICACSDF 2026

Conference Themes

ICACSDF 2026 invites high-quality original contributions related to Cyber Security and Digital Forensics. The topics listed below are indicative (not limited to). The conference is sponsored by IEEE UP Section Conference Record #70668.

Countdown to ICACSDF 2026
Conference starts: 11 September 2026
--
Days
--
Hours
--
Minutes
--
Seconds
Submit your best work and present it at UPES Dehradun, Uttarakhand.

Conference Topics

The theme areas below reflect the evolving landscape of cybersecurity, privacy, and digital forensics.

  • Authentication and authorization of users, systems, and applications
  • Business models with security and privacy requirements
  • Case studies in security and privacy
  • Computer worms and viruses
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Hacking, cyber-terrorism, intrusion detection
  • Network security protocols
  • Security/privacy techniques, management, and protocols

  • Identity and privacy confidentiality
  • Applied cryptography in the cloud
  • Anonymity and authentication
  • Cryptographic implementation and testing
  • Cryptanalysis and attacks
  • Key distribution and management
  • Identity-based cryptography
  • Digital signatures and secure voting
  • Trust management

  • Threat modeling and vulnerability analysis
  • AI/ML-based cyber threat analysis
  • CTI sharing, consumption, interoperability
  • Deception technologies
  • Dynamic risk management analysis
  • Threat hunting and curation
  • Dark Web CTI exploration
  • Threat analysis for cyber-physical systems

  • Quantum Key Distribution (QKD)
  • Secure quantum computing
  • Quantum cryptanalysis
  • Quantum hacking
  • Quantum Internet
  • Device-independent cryptography

  • Securing smart contracts
  • Blockchain vulnerabilities and threats
  • Privacy solutions in blockchain
  • Identity management and blockchain security
  • Consensus mechanisms and security
  • Incident response in blockchain environments
  • Fraud detection and financial crime prevention

  • Deep learning / reinforcement learning for cyber defenses
  • Cyber vulnerability prioritization and remediation
  • Network intrusion detection and mitigation
  • Adversarial behavior modeling
  • Interpretable and robust cyber-systems

  • Enterprise security policies and governance
  • Risk management and compliance auditing
  • Incident response policies and effectiveness of controls
  • Continuous monitoring and assurance frameworks

  • Machine learning in evidence extraction
  • Malware analysis and attribution
  • Network, cloud, and mobile forensics
  • Big data forensics and non-traditional scenarios
  • Digital evidence law and policy

  • IoT device security and firmware security
  • IoT authentication and access control
  • Threat detection in IoT and critical infrastructure
  • IoT security standards and ecosystem protection

  • Secure SDLC, DevSecOps, and patch management
  • Static and dynamic application security testing
  • Supply chain security and memory safety
  • Secure coding and threat modeling

  • Preventing XSS and mitigating SQL injection
  • Authentication and session management
  • Secure HTTPS/TLS, CSP, CSRF protection
  • API security and web DoS/DDoS protection

  • Penetration testing methodologies
  • Automated security testing tools
  • Red Team vs. Blue Team exercises
  • Post-breach security auditing and continuous monitoring

  • Cryptographic protocols for secure communication
  • TLS, IPSec, secure key exchange
  • Zero Trust security protocols
  • Security protocols in IoT and wireless networks

  • Static vs dynamic malware analysis
  • Behavioral analysis and detection
  • APT detection and memory forensics
  • Ransomware analysis and prevention

  • Steganography and steganalysis
  • Digital watermarking for media security
  • Reversible data hiding methods
  • Watermarking in cloud and encrypted domains

  • Database encryption and access control
  • SQL injection prevention and auditing
  • Operating system hardening and patch management
  • Database activity monitoring and intrusion detection

  • Cloud IAM and identity access management
  • Cloud security compliance and isolation
  • Zero Trust architecture for cloud
  • Cloud threat detection, monitoring, and DLP
  • Securing cloud APIs