Conference Information
ISNS 2020: International Conference on Information Security and Network Security
https://www.confjuly.org/conference/ISNS2020/
Submission Date:
2020-06-16 Extended
Notification Date:
Conference Date:
2020-07-17
Location:
Kunming, China
Years:
1
Viewed: 1566   Tracked: 1   Attend: 0

Conference Location
Call For Papers
信息安全与网络安全国际研讨会 (ISNS 2021)
Int'l Conference on Information Security and Network Security (ISNS 2021)
大会官网:https://www.confjuly.org/conference/ISNS2021/
大会时间:2021年7月16-18日
大会地点:中国昆明
在线投稿:https://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1369
邮箱投稿:intelconf@163.com
录用通知:论文投稿后1周左右
△. 会议简介
会议延期通知:
由于目前国内乃至全世界新型冠状病毒感染肺炎疫情仍未结束,世界各国仍维持非常严格的禁止集会,非必要不得出入境,必须14天隔离的政策。同时也为了大家的身体和生命安全,积极响应国家“不出门,不聚会”阻断和隔离传染的号召,我们将推迟此次会议,原定于2020年7月17-19的会议延期至2021年7月16-18日在昆明举行(官网:http://www.confjuly.org/conference/ISNS2021/)。如给您造成不便,我们非常抱歉,望谅解。 
信息安全与网络安全国际研讨会 (ISNS 2021)将于2021年7月16-18日在中国昆明举行。ISNS 2021旨在为业内专家学者分享技术进步和业务经验,聚焦信息安全与网络安全等相关领域的前沿研究,提供一个交流的平台。本届大会将继续遵循学术性、国际性的原则,特邀国内外信息安全与网络安全等相关领域内的学者专家前来参会,并做出精彩的报告。
△.文章出版
所有被会议录用的稿件将会发表在开源期刊,被知网学术、谷歌学术等收录。
△.投稿须知:
论文应具有学术或实用价值,未在国内外学术期刊或会议发表过。
论文排版格式以及投稿方式详见网站说明。
审稿流程:本次会议采用先投稿,先送专家评审的方式进行,审稿周期约1周。
△.参会方式(注:会议有Oral Presentation以及Poster环节)
1.全文参会:提交全文并发表,申请参与10-15分钟的口头报告,3600元
2.摘要参会:提交摘要,申请参与10-15分钟的口头报告,2700元
3.听众参会:只参会听讲,不参与演讲及展示,2400元
△. 大会咨询
联系人:张老师
邮箱:intelconf@163.com
QQ:1349406763
电话:132 6470 2250
微信:3025797047
△. 大会议题
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
Grid Security
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing and Trustworthy Computing Technology
Last updated by Lin Ru in 2020-06-19
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
SCOMInternational Conference on Soft Computing2020-10-042020-10-302020-12-12
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
ICT4AWEInternational Conference on Information and Communication Technologies for Ageing Well and e-Health2015-12-072016-02-012016-04-21
ICSPACInternational Conference on Security, Pattern Analysis, and Cybernetics2017-08-302017-09-302017-12-15
ICSAIInternational Conference on Systems and Informatics2020-03-302020-05-302020-09-12
WAPLInternational Workshop on Advances in Programming Languages 2011-07-162011-09-18
cba1ICIPInternational Conference on Image Processing2020-01-312020-04-302020-10-25
ICCATEInternational Conference on Computers and Advanced Technology in Education2012-12-102012-12-202013-01-14
ICCTIMInternational Conference on Computing Technology and Information Management2017-11-07 2017-12-08
Recommendation