2023 |
Cybersecurity of Smart Peripheral Devices (Mobiles / IoT / Edge) |
|
2022 |
Ensuring Trust in a Decentralized World |
|
2021 |
Automation in Cybersecurity |
|
2020 |
Deceptive Security |
|
2019 |
Virtualization and Cybersecurity |
|
2018 |
Artificial Intelligence and Cybersecurity |
|
2017 |
Data protection facing cyber threats |
|
2016 |
Internet of the Objects: you said security ? |
|
2015 |
Resilience of digital systems |
|
2014 |
Detection and response to cyber attacks |
|
2013 |
Cybersecurity of SCADA and Industrial Control Systems |
|
2012 |
Cloud and security : Threat or opportunity |
|
2011 |
Mobility and security |
|
2010 |
Cyberdefense |
|
2009 |
Wireless Security |
|
2008 |
Trusted Computing |
|
2007 |
Cryptography: New Challenges |
|
2006 |
Security & Voice-Data Convergence |
|
2005 |
Modelling & Security |
|
2004 |
Human factor |
|
2003 |
Cyberdefense |
|
2002 |
Mobiles' Security |
|
2001 |
Evaluation |
|
2000 |
Authentication |
|
2000 |
Computer Networks Protection |
|
1999 |
Free Software & Security |
|
1999 |
Cryptography |
|
1998 |
Risk Management |
|
1998 |
Internet & Security |
|
1997 |
Multilevel Systems |
|