Computer Network, Cyber Security and Privacy
- Wireless Sensor Networks, IoT and Network Security
- Mobile Ad hoc and Sensor Networks
- Software-defined networking (SDN)
- Network Virtualization
- Computer Forensics
- Privacy Preserving
- Web Services and Semantic Web
- Cryptography and Data Security
- Block-Chain Applications
- Web Applications Security
- Vulnerability analysis and Risk Management
- Firewall, Honey net and Intrusion Detection Systems
- Security in Fog / edge Computing
- Security of Virtual Machines
- Security Threats & Countermeasures
- Security, Trust and privacy challenges
- AI-Powered Cyber Threats & Defenses, Post-Quantum Cryptography
Artificial Intelligence and Soft Computing
- Automation and Expert Systems
- Computer Vision and Speech Understanding
- Data Mining Applications
- Soft Computing
- Fuzzy Systems and Probabilistic Reasoning
- Knowledge Discovery
- Computational Intelligence and Recommender Systems
- Machine Learning and Neural Network
- Natural language processing
- Computer vision and robotics
- Optimization and Approximation Algorithms
- Hybrid Intelligent Systems
- Swarm intelligence
- Artificial immune systems
- Feature Selection and Transformation
Data Science, Analytics and Applications
- Big Data Technologies
- Business and Data Analytics
- Decision Support Systems
- Dimensional Modelling
- Text Analytics
- Data Warehouse Management
- Web Analytics
- Statistics Exploratory Data Analysis
- Predictive Modelling
- Information Retrieval
- Information Integration
- Data Management and Quality
- Mobile Data Management
- Management of Sensor Data
- Data Modeling and Visualization
- Real-time Data Processing and Analysis
- Time Series Analysis, Anomaly Detection
Software Engineering and Information Systems
- Software Requirements, Architecture and Evolution
- Software Testing, Verification and Validation
- Empirical Software Engineering
- Software Metrics and Measurement
- Mobile and Ubiquitous Software Systems
- Intelligent Software Engineering
- Model-based Software Engineering
- Human-Centered Software Engineering
- Strategic Information Systems
- ICT Governance
- Green Technology and Sustainability
- Computational and Systems Biology
- Computational Modeling
- Simulation in Science and Engineering
- Computer Games and Simulation
- Databases and Visualization
- Mobile Computing
Applied Mathematics
- Advanced Numerical Algorithms
- Complex Systems: Modeling and Simulation
- Computational Mathematics
- Parallel and Distributed Computing
- Applied Partial Differential Equations
- Numerical Analysis and Methods
- Scientific Computation
- Nonlinear Problems in Mechanics
- Algebra and its Application
- Differential Equations and Dynamical Systems
- Financial and Actuary Mathematics
- Fuzzy Mathematics and its Applications
- Geometry and its Application
- Applied Mathematics Models and Simulation
- Statistical Methods in Technical and Economic Sciences
- Optimization, Modelling, and Simulation
- Uncertain Theory and Applications
- Non-Linear Control, Sustainable Development
- Coding Theory, Reliability
Ethics, Governance & Responsible AI / AI Ethics in Practice
- Fairness, Transparency, Accountability, Bias in AI
- National and International Policy/Regulation
- Ethical Frameworks
- Human-Centered AI
- Societal Implications
- Secure Multiparty Computation, Homomorphic Encryption
- AI-Based Algorithmic Impact Assessments
Emerging Topics & Cutting-edge technologies Quantum computing for analytics
- AI for Climate Science
- Computational Social Science
- Digital Twins
- Autonomous Systems
- Fog Grid and Cloud Computing
- Edge Intelligence
- Human-in-the-loop Analytics, Visual Analytics
- Emerging IT Applications Trend in Business
- Emerging Trends in ICT and Educational Technology
- Emerging IT Applications in Mass Media
- Emerging IT Applications in Biotechnology
- Emerging IT Applications in Engineering
- Emerging IT Applications in Health
- Biostatistics Applications

