Information Security, Cloud Computing and Security, cloud forensics, security challenges and data analysis, cloud authentication techniques, cyber security, semantic attacks in online social networks, data privacy in online social networks, data protection and privacy challenges in the Internet of Things, application of blockchain technology for security, RPL attacks in IoT, IoT Malware detection and mitigation, Blockchain Technology, Fog Computing Security, Automotive Cyber Security; Quantum Computing and Communication; Post Quantum Cryptography