Topics(include but are not limited to)


  • Theoretical foundations and algorithms for addressing insider threats
  • Insider threat assessment and modeling
  • Security technologies to prevent, detect and avoid insider threats
  • Validating the trustworthiness of staff
  • Post-insider threat incident analysis
  • Data breach modeling and mitigation techniques
  • Registration, authentication and identification
  • Certification and authorization
  • Database security
  • Device control system
  • Digital forensic system
  • Digital right management system
  • Fraud detection
  • Network access control system
  • Intrusion detection
  • Keyboard information security
  • Information security governance
  • Information security management systems
  • Risk assessment and management
  • Log collection and analysis
  • Trust management
  • IT compliance (audit) and continuous auditing