Información de la conferencia
ICINS 2016: International Conference on Information and Network Security
Por favor Iniciar para ver el sitio web del congreso
Día de Entrega: |
2016-10-30 Extended |
Fecha de Notificación: |
2016-11-15 |
Fecha de Conferencia: |
2016-12-28 |
Ubicación: |
Kuala Lumpur, Malaysia |
Años: |
4 |
Vistas: 15280 Seguidores: 0 Asistentes: 0
Solicitud de Artículos
2016 4th International Conference on Information and Network Security (ICINS 2016) will be held from December 28-31, 2016 in Kuala Lumpur, Malaysia. ICINS 2016 will bring together top researchers from Asian Pacific areas, North America, Europe and around the world to exchange research results and address open issues in all aspects of Information and Network Security.
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
Accepted papers (Registered & Presented) will be published in the International Conference Proceedings Series by ACM, which will be archived in the ACM Digital Library, and indexed by Ei Compendex and Scopus and submitted to be reviewed by Thomson Reuters Conference Proceedings Citation Index (ISI Web of Science).
Sumission Methods:
1. Electronic Submission System; Log in and submit your paper.
(If you can't login the submission system, please try to submit through method 2.)
2. You can also send your paper directly to icins@iacsit.org
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
Accepted papers (Registered & Presented) will be published in the International Conference Proceedings Series by ACM, which will be archived in the ACM Digital Library, and indexed by Ei Compendex and Scopus and submitted to be reviewed by Thomson Reuters Conference Proceedings Citation Index (ISI Web of Science).
Sumission Methods:
1. Electronic Submission System; Log in and submit your paper.
(If you can't login the submission system, please try to submit through method 2.)
2. You can also send your paper directly to icins@iacsit.org
Última Actualización Por Dou Sun en 2016-10-23
Conferencias Relacionadas
| CCF | CORE | QUALIS | Abreviación | Nombre Completo | Entrega | Notificación | Conferencia |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| b1 | ICOIN | International Conference on Information Networking | 2025-10-24 | 2025-11-15 | 2026-01-14 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b4 | MINES | International Conference on Multimedia Information Networking and Security | 2013-07-20 | 2013-07-25 | 2013-11-01 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |
Revistas Relacionadas
| CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Information Polity | 1.8 | IOS Press | 1570-1255 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Wireless Information Networks | 1.2 | Springer | 1068-9605 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | Discover Computing | Springer | 2948-2992 |