信息安全与网络安全国际研讨会 (ISNS 2020) Int'l Conference on Information Security and Network Security (ISNS 2020) 大会官网:https://www.confjuly.org/conference/ISNS2020/ 大会时间:2020年7月17-19日 大会地点:中国昆明 在线投稿:http://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1243 邮箱投稿:intelconf@163.com 录用通知:论文投稿后1周左右 △. 会议简介 信息安全与网络安全国际研讨会 (ISNS 2020)将于2020年7月17-19日在中国昆明举行。ISNS 2020旨在为业内专家学者分享技术进步和业务经验,聚焦信息安全与网络安全等相关领域的前沿研究,提供一个交流的平台。本届大会将继续遵循学术性、国际性的原则,特邀国内外信息安全与网络安全等相关领域内的学者专家前来参会,并做出精彩的报告。 △.文章出版 所有被会议录用的稿件将会发表在开源期刊,被知网学术、谷歌学术等收录。 △.投稿须知: 论文应具有学术或实用价值,未在国内外学术期刊或会议发表过。 论文排版格式以及投稿方式详见网站说明。 审稿流程:本次会议采用先投稿,先送专家评审的方式进行,审稿周期约1周。 △.参会方式(注:会议有Oral Presentation以及Poster环节) 1.全文参会:提交全文,申请参与10-15分钟的口头报告,3600元 2.摘要参会:提交摘要,申请参与10-15分钟的口头报告,2700元 3.听众参会:只参会听讲,不参与演讲及展示,2400元 △. 大会咨询 联系人:张老师 邮箱:intelconf@163.com QQ:1349406763 电话:132 6470 2250 微信:3025797047 △. 大会议题 Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
Grid Security
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing and Trustworthy Computing Technology
|