Información de la conferencia
ISNS 2025: International Conference on Information Security and Network Security
Por favor Iniciar para ver el sitio web del congreso
Día de Entrega: |
2025-01-06 |
Fecha de Notificación: |
|
Fecha de Conferencia: |
2025-07-18 |
Ubicación: |
Kunming, China |
Años: |
5 |
Vistas: 14812 Seguidores: 2 Asistentes: 0
Solicitud de Artículos
The 5th Int'l Conference on Information Security and Network Security (ISNS 2025) will be held during July 18-20, 2025 in Kunming, China. You are invited to submit papers and participate in our academic exchange.
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Anti-Virus and Anti-Worms Trusted Computing and Trustworthy Computing Technology
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
Security in Cloud and Grid Systems
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Standards and Assurance Methods
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Anti-Virus and Anti-Worms Trusted Computing and Trustworthy Computing Technology
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
Security in Cloud and Grid Systems
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Standards and Assurance Methods
Última Actualización Por Dou Sun en 2024-08-23
Conferencias Relacionadas
Revistas Relacionadas
| CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information Technology & People | 5.6 | Emerald | 0959-3845 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Journal of Information Science | 1.7 | SAGE | 0165-5515 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Wireless Information Networks | 1.2 | Springer | 1068-9605 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |