11–12 September 2026  |  UPES Dehradun, Uttarakhand  | 
Sponsored by IEEE UP Section conference_socs@ddn.upes.ac.in
ICACSDF 2026
UPES Logo IEEE UP Section Logo

Sponsored by IEEE UP Section
Themes & Topics • ICACSDF 2026

Conference Themes

ICACSDF 2026 invites high-quality original contributions related to Cyber Security and Digital Forensics. The topics listed below are indicative (not limited to). The conference is sponsored by IEEE UP Section.

Countdown to ICACSDF 2026
Conference starts: 11 September 2026
--
Days
--
Hours
--
Minutes
--
Seconds
Submit your best work and present it at UPES Dehradun, Uttarakhand.

Conference Topics

The theme areas below reflect the evolving landscape of cybersecurity, privacy, and digital forensics.

  • Authentication and authorization of users, systems, and applications
  • Business models with security and privacy requirements
  • Case studies in security and privacy
  • Computer worms and viruses
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Hacking, cyber-terrorism, intrusion detection
  • Network security protocols
  • Security/privacy techniques, management, and protocols

  • Identity and privacy confidentiality
  • Applied cryptography in the cloud
  • Anonymity and authentication
  • Cryptographic implementation and testing
  • Cryptanalysis and attacks
  • Key distribution and management
  • Identity-based cryptography
  • Digital signatures and secure voting
  • Trust management

  • Threat modeling and vulnerability analysis
  • AI/ML-based cyber threat analysis
  • CTI sharing, consumption, interoperability
  • Deception technologies
  • Dynamic risk management analysis
  • Threat hunting and curation
  • Dark Web CTI exploration
  • Threat analysis for cyber-physical systems

  • Quantum Key Distribution (QKD)
  • Secure quantum computing
  • Quantum cryptanalysis
  • Quantum hacking
  • Quantum Internet
  • Device-independent cryptography

  • Securing smart contracts
  • Blockchain vulnerabilities and threats
  • Privacy solutions in blockchain
  • Identity management and blockchain security
  • Consensus mechanisms and security
  • Incident response in blockchain environments
  • Fraud detection and financial crime prevention

  • Deep learning / reinforcement learning for cyber defenses
  • Cyber vulnerability prioritization and remediation
  • Network intrusion detection and mitigation
  • Adversarial behavior modeling
  • Interpretable and robust cyber-systems

  • Enterprise security policies and governance
  • Risk management and compliance auditing
  • Incident response policies and effectiveness of controls
  • Continuous monitoring and assurance frameworks

  • Machine learning in evidence extraction
  • Malware analysis and attribution
  • Network, cloud, and mobile forensics
  • Big data forensics and non-traditional scenarios
  • Digital evidence law and policy

  • IoT device security and firmware security
  • IoT authentication and access control
  • Threat detection in IoT and critical infrastructure
  • IoT security standards and ecosystem protection

  • Secure SDLC, DevSecOps, and patch management
  • Static and dynamic application security testing
  • Supply chain security and memory safety
  • Secure coding and threat modeling

  • Preventing XSS and mitigating SQL injection
  • Authentication and session management
  • Secure HTTPS/TLS, CSP, CSRF protection
  • API security and web DoS/DDoS protection

  • Penetration testing methodologies
  • Automated security testing tools
  • Red Team vs. Blue Team exercises
  • Post-breach security auditing and continuous monitoring

  • Cryptographic protocols for secure communication
  • TLS, IPSec, secure key exchange
  • Zero Trust security protocols
  • Security protocols in IoT and wireless networks

  • Static vs dynamic malware analysis
  • Behavioral analysis and detection
  • APT detection and memory forensics
  • Ransomware analysis and prevention

  • Steganography and steganalysis
  • Digital watermarking for media security
  • Reversible data hiding methods
  • Watermarking in cloud and encrypted domains

  • Database encryption and access control
  • SQL injection prevention and auditing
  • Operating system hardening and patch management
  • Database activity monitoring and intrusion detection

  • Cloud IAM and identity access management
  • Cloud security compliance and isolation
  • Zero Trust architecture for cloud
  • Cloud threat detection, monitoring, and DLP
  • Securing cloud APIs