Cyber Warfare
Digital attacks, cyber conflict, offensive techniques, and protection strategies for critical computer systems and infrastructures.
Program
The conference program includes plenary sessions, section work, a round table, and lectures. Detailed timing will be published after paper review and final scheduling.
Tracks
Tracks stay visible on the program page so both authors and attendees can understand the shape of the conference before the detailed timetable is ready.
Digital attacks, cyber conflict, offensive techniques, and protection strategies for critical computer systems and infrastructures.
Protection of networks, servers, information systems, quantum cryptography, and telecommunications against malicious attacks.
High-performance computing, quantum computing, satellite communication, signal processing, and distributed processing for space systems.
Artificial intelligence and machine learning, computer vision and image processing, embedded systems and IoT, and wireless ad hoc networks.
Schedule
This area becomes the full conference schedule once paper decisions, invited sessions, and room planning are complete.
Program structure, named speakers, and session timing will appear here after invitations, reviews, and room assignments are confirmed.