· Trust Management
· Information centric network
· Attack detection and prevention
· BlockchainSecurity and Privacy
· Authentication Protocol and Key Management
· Anonymous communication, metrics, and performance
· Trust and Security Modeling
· Network intrusion detection and prevention
· Anti virus and anti malware software
· Information leakage
· Information theft
· Data tampering
· Data deletion
· Computer virus
· Security vulnerabilities
· Attack monitoring
· Encrypted communication