The conference provides a forum for exploring new cybersecurity techniques for different applications. The conference is a vehicle for data analysts, developers, researchers, and security professional and others to learn and present their recent findings in the field of cybersecurity.

The conference accepts new research articles in the following tracks,but not limited to:

Track 1 :Cybersecurity

Track 2: Secure Databases

Track 3: Secure Cloud Computing

Track 4: Secure Networks

Track 5: Internet of Things Security

Track 6: General Track

Special Track: Problems and Solutions to Cybersecurity in the Kingdom

Published at