Aligned with
This conference contributes to global sustainability by aligning its research discussions and academic sessions with key United Nations Sustainable Development Goals. It fosters knowledge exchange, innovation, and collaborative engagement.
This track focuses on the latest methodologies and technologies in mobile threat defense. Researchers are invited to present innovative solutions that enhance the security posture of mobile applications against evolving threats.
This session will explore best practices in secure mobile application development, emphasizing the importance of integrating security throughout the software development lifecycle. Contributions should highlight techniques that mitigate vulnerabilities during the design and coding phases.
This track examines cutting-edge mobile authentication methods that enhance user security while maintaining usability. Papers should discuss the effectiveness and implementation of various authentication technologies in mobile environments.
This session invites contributions on methodologies for identifying and analyzing vulnerabilities within mobile applications. Researchers are encouraged to present case studies or novel approaches that improve vulnerability detection processes.
This track will cover the latest advancements in mobile malware detection and prevention techniques. Participants are invited to share research that addresses the challenges posed by sophisticated mobile threats.
This session focuses on the implementation of secure coding practices in mobile application development. Papers should discuss frameworks and guidelines that help developers write secure code to protect against common vulnerabilities.
This track explores security features and vulnerabilities specific to mobile operating systems. Researchers are encouraged to analyze the security architecture of various mobile OS platforms and propose enhancements.
This session will address the security measures and compliance requirements for mobile app stores. Contributions should focus on strategies to ensure the integrity and security of applications available to users.
This track examines the role of encryption in securing mobile applications and data. Researchers are invited to present innovative encryption methods that enhance data protection in mobile environments.
This session focuses on methodologies and tools for conducting penetration testing on mobile applications. Papers should highlight practical experiences and findings from real-world penetration testing engagements.
This track explores the intersection of mobile device management and security practices. Contributions should discuss strategies for managing mobile devices securely within organizational environments, including BYOD policies.