| Compiler Security |
|
| Compressive Sampling |
|
| Confinement |
|
| Control Theory |
|
| Data at Rest - Data i Motion |
|
| Computational Intelligence |
|
| Edge Detection |
|
| Expert Systems |
|
| Cryptanalysis |
|
| Covert Channels |
|
| Browser Security |
|
| Facial Recognition |
|
| Fuzzy Logic and Security |
|
| CAPTCHA |
|
| Cognitive Radio Security |
|
| 2014 Iran Workshop on Communication and Information Theory (IWCIT) - Iran |
|
| Web Caching |
|
| International Science of Security Research: China Communications 2013 |
|
| International Science of Security Research: China Communications 2014 |
|
| Forward Error Correction |
|
| International Conferences: Dependable Systems and Networks (2014) - USA |
|
| 15th International Conference on Information & Communications Security (ICICS 2013) - Beijing, China |
|
| Visible Light Communication |
|
| China Summit & International Conference on Signal and Information Processing (ChinaSIP) - Xi'an, China |
|
| 6th International Conference on New Technologies, Mobility & Security (NTMS) - Dubai |
|