The technical areas include, but are not limited to:
| Computational Intelligence |
| • | Artificial Immune Systems |
| • | Autonomy-Oriented Computing |
| • | Biological Computing |
| • | Coevolutionary Algorithms |
| • | Evolutionary Computation |
| • | Fuzzy Systems |
| • | Intelligent Agents and Systems |
| • | Machine Learning |
| • | Molecular Computing |
| • | Neural Computing |
| • | Probabilistic Reasoning |
| • | Reinforcement Learning |
| • | Swarm Intelligence |
| • | Support Vector Machine |
| • | Unsupervised Learning |
| • | Cryptography and Coding |
| • | Cryptographic Protocols |
| • | Detection of Abnormality |
| • | Electronic Commerce Security |
| • | Intrusion Detection |
| • | Information, Data and System Integrity |
| • | Information Hiding |
| • | Information Security Management |
| • | Information Storage and Retrieval System |
| • | Mobile Code & Agent Security |
| • | Media Data Authentication |
| • | Security Models and Architectures |
| • | Security Analysis Methodologies |
| • | Steganography and Watermarking |
| • | Web and Wireless Security |
| • | Bioinformatics and Medical Diagnosis |
| • | Copyright Protection |
| • | Cryptography and Its Applications |
| • | Data Mining |
| • | Data Privacy |
| • | Detection of Hidden Communication Channels |
| • | Digital Signatures |
| • | Electronic Commerce Security |
| • | Identity Recognition |
| • | Image and Signal Processing |
| • | Intelligent Information Retrieval |
| • | Pattern Recognition |
| • | Web and Network Applications |
| • | Other Applications |