Vous êtes sur la page 1sur 0

DATA AND INFORMATION SECURITY RESEARCH TOPICS (2013)

1. Access control and authorization 77. Privacy on WEB and DB


2. Access control policies 78. Privacy preserving system
3. Anonymity and Privacy
79. Provable Security
4. Application Security 80. Public key infrastructure
5. Attack response, countermeasures, and
intrusion tolerance
81. Quantum Cryptography
82. Ransom Attacks
6. Attacks against IDS and evasion 83. Reactive firewalls
7. Attacks and Prevention of Online Fraud 84. Resource usage control
8. Authentication and Authorization
85. RFID security
9. Authentication, biometrics, smartcards 86. Risk analysis and risk management
10. Authorization and access control
87. Risk Evaluation of critical assets
11. Biometric Security(Tu basma ritmi, parmak
izi)
88. Secret Key and Public Key Cryptosystems
12. Block Cipher Modes of Operation
89. Secure context aware computing
13. Cloud Computing Security 90. Secure e-government
14. Common Criteria 91. secure electronic commerce
15. Computer forensics analysis 92. Secure routing
16. Cooperation and fairness 93. Secure topology control
17. Criminal Network Analysis 94. Secure ubiquitous computing
18. Cryptographic Protocols and Functions 95. security administration
19. Cybercrime and Cybersecurity,
96. Security and Privacy in Pervasive/Ubiquitous
Computing
20. Data and application security 97. Security as quality of service
21. Data Governance and Data Leakage
Prevention 98. Security evaluation
22. Data protection 99. Security for embedded systems
23. Deception systems and honeypots 100. Security for Mobile Code
24. Distributeed Denial of service attacks 101. Security for mobile computing
25. Botnets and identification 102. Security in Information Flow
26. Design and Analysis of Cryptographic
Algorithms 103. Security in sensor networks
27. Digital Rights Management 104. security in social networks
28. Digital signatures 105. Security management
29. Distributed firewalls 106. Security Metrics
30. Distributed intrusion detection 107. Security Modeling and Architectures
31. Distributed System Security 108. Security of eCommerce, eBusiness and
eGovernment
32. e-business/e-commerce security 109. Security of Grid Computing
33. Economics of Security and Privacy
110. Security Protocols and Their Analysis
34. Efficient representations and implementations
35. Electronic Evidence Analysis
36. Electronic voting Security
111. Software Security
37. Enterprise security models and policies
112. Social Media security
113. Social Network Attacks
114. System security
38. Firewalls
39. Foundations of Computer Security 115. Transaction Security
40. Hacking Philosophy 116. Trust models and trust management
policies
41. Hash Functions and MACs
117. Trusted Computing
42. High-performance intrusion detection 118. Viruses and other malicious codes
43. Identity and Trust Management
119. Vulnerability analysis and risk
assessment
44. IDS cooperation and event correlation 120. Web Security
45. Implementation of Cryptosystems
121.
46. Information Hiding and Watermarking 122.
47. Information Security Standards and
certification 123.
48. Information Systems Auditing 124.
49. Information warfare and critical infrastructure
protection 125.
50. Infrastructure Security 126.
51. Insider threat detection and mitigation 127.
52. Intellectual Property Protection
128.
53. Internet and web security 129.
54. Intrusion detection and prevention techniques 130.
55. Intrusion detection assessment and
benchmarking 131.
56. Intrusion detection in mobile networks) 132.
57. Intrusion prediction 133.
58. IP Tarace back 134.
59. ISMS and ISG(Inf. Security Governance) 135.
60. Key Management and Key Recovery
136.
61. Language-based security 137.
62. Legal and social issues 138.
63. Location privacy 139.
64. Malicious code detection and containment 140.
65. Mobile code and mobile agent security 141.
66. Mobile security 142.
67. Mobile System Security
143.
68. Mobile, Ad Hoc and Sensor Network Security 144.
69. Network and Wireless Network Security 145.
70. Network Security
146.
71. Operating System Security 147.
72. Peer-to-Peer Network Security 148.
73. Phishing 149.
74. PKI and PMI 150.
75. Prevention of traffic analysis 151.
76. Privacy and anonymity

Vous aimerez peut-être aussi