The 41 revised full papers presented in these proceedings were carefully reviewed and selected from 105 submissions. The papers are organized in the following topical sections:
Volume I:
Crime profile analysis and Fact checking, Information hiding and Machine learning.
Volume II:
Password, Authentication and Cryptography, Vulnerabilities and Cybersecurity and forensics.