Topics of Interest

Key Focus Areas

  • Assured and Trusted IoT Microelectronic Applications
  • IoT Hardware Security and Trust
  • Edge Computing Security Applications
  • Secure IoT-based Distributed Systems, Edge, and Cloud Computing
  • IoT Network/Communication Security and Privacy
  • Trustworthy ML and Embedded AI Hardware
  • Secure Heterogeneous System Integration
  • Reliable and Assured 3D/Additive Manufacturing
  • Artificial Intelligence and Applications

Topic of Interest

Track 1:

Assured and Trusted IoT & Microelectronic Systems

  • Secure Microelectronics for IoT Devices
  • Secure IoT Device Supply Chains
  • Trusted Computing for IoT Applications
  • Secure Embedded AI Systems
  • Secure and Assured 3D/Additive Manufacturing for IoT Systems
  • Hardware Root of Trust and Tamper-Resistance in IoT
  • Secure Boot and Firmware Integrity

Track 2:

Secure IoT/ Edge and Heterogeneous System Integration

  • IoT Hardware Security and Trust
  • Security and Assurance in Heterogeneous System Integration
  • Secure Hardware Accelerators for IoT
  • Supply Chain Integrity Verification for Embedded Systems
  • Side-Channel Analysis and Countermeasures
  • Physical Unclonable Functions (PUFs) for IoT Identity

Track 3:

Distributed and Cloud Systems Security

  • Edge Computing Security Techniques
  • Secure IoT-based Distributed Systems, Edge, and Cloud Computing
  • IoT-Based Distributed Systems Security
  • Digital Twin Security for IoT Systems
  • Advanced IoT Security Frameworks
  • Blockchain for Secure Distributed IoT Systems
  • Blockchain-enabled Trust and Data Integrity in Cloud-Edge Architectures

Track 4:

Network and Communication Protocol Security and Privacy

  • IoT Network/Communication Security and Privacy
  • Secure IoT Communication Protocols
  • Blockchain for IoT Device Authentication
  • Smart Contract Security in IoT
  • Quantum-Safe Cryptography for IoT
  • Zero Trust Architecture in IoT Networks
  • 5G and IoT Security
  • Physical Layer Security
  • IoT Privacy Enhancing Technologies
  • Secure and Green Communication for IoT Systems

Track 5:

: Trustworthy AI and Machine Learning Security

  • Trustworthy Machine Learning for IoT
  • AI-driven Threat Detection for IoT
  • Deep Learning for IoT Anomaly Detection
  • Secure Generative AI for Predictive Modeling in IoT
  • AI-based Fraud Detection Systems
  • Trusted ML and Embedded AI Hardware
  • AI for Secure Decision-Making in IoT
  • Adversarial Attacks and Data Poisoning Defenses in IoT AI/ML
  • Model Robustness and Resilience in IoT AI/ML Systems
  • Privacy-Preserving Machine Learning in IoT
  • Trustworthy AI/ML Pipelines and Secure Deployment in IoT Systems

Track 6:

: AI-Enabled Cyber-Physical Systems Security

  • Security and Privacy in AI-driven Smart City Applications
  • Securing AI-based Healthcare Systems and Data
  • Safety, Security, and Validation of AI in Autonomous Vehicles
  • Resilience of AI-Driven Control Systems for Critical Infrastructure
  • Secure Manufacturing and Supply Chain Assurance

Publishing Partner

Conference Venue