Track Chair:
Rasheed Husain, University of Bristol, United Kingdom
[email protected]

Nikolaos Polatidis, University of Brighton, UK
[email protected]

Fatima Hussain, Royal Bank of Canada, Canada
[email protected]

Scope  
The Security, Privacy and Trust track aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products that involve the cybersecurity aspects in our daily activities. The focus of the track is on advances in
Cybersecurity technologies that involves new attacks and hacker exploits in several domains such as automotive, cyber-physical systems, networking infrastructure, quantum computing, artificial intelligence, deep learning for information security, digital crime and forensics, intrusion detection/prevention and incident response, malware and attack analysis, privacy and data breaches, and governance and information security management. The track aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main stockholders of the Security, Privacy and Trust domain. We solicit submissions of original unpublished scholarly work that is not under consideration by another journal or conference.

Topics
Security threats and vulnerabilities
Privacy and Security in Cloud and Edge Computing
Privacy and Security in Data Center Networks
Automated Vehicular Technologies
Vehicular Communications and Networks
In-Vehicle communication protocols
Offensive and Defensive Cybersecurity
Identity Management and Key Management Systems
Security and Privacy in Quantum Computing
Exploit design and implementation
Network privacy and security
Application security
Cyber-security solutions for connected and autonomous vehicles
Attacks and Countermeasures
Authentication
Safety and Security Trade-off and Convergences
Distributed systems security
Embedded systems security
Forensics
Intrusion detection and Response
Malware and virus detection
Mobile security and privacy
Network security
Privacy-preserving systems
IoT privacy and security
Security and privacy policies
Security architectures
System security
Usable security and privacy
Web security and privacy
Privacy of vehicular data
Standardization and Interoperability
National information Security
Mobile trusted computing
Security policy and management of trusted computing
Access control for trusted platforms
Privacy aspects of trusted computing
Verification of trusted computing architectures
End-user interactions with trusted platforms
Limitations of trusted computing.

This topic list is not meant to be exhaustive. Security and privacy is interested in all aspects of computer security and privacy.

Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.