Conference Information
ISNS 2020: International Conference on Information Security and Network Security
https://www.confjuly.org/conference/ISNS2020/Submission Date: |
2020-06-16 Extended |
Notification Date: |
|
Conference Date: |
2020-07-17 |
Location: |
Kunming, China |
Years: |
1 |
Viewed: 6680 Tracked: 1 Attend: 0
Call For Papers
信息安全与网络安全国际研讨会 (ISNS 2021) Int'l Conference on Information Security and Network Security (ISNS 2021) 大会官网:https://www.confjuly.org/conference/ISNS2021/ 大会时间:2021年7月16-18日 大会地点:中国昆明 在线投稿:https://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1369 邮箱投稿:intelconf@163.com 录用通知:论文投稿后1周左右 △. 会议简介 会议延期通知: 由于目前国内乃至全世界新型冠状病毒感染肺炎疫情仍未结束,世界各国仍维持非常严格的禁止集会,非必要不得出入境,必须14天隔离的政策。同时也为了大家的身体和生命安全,积极响应国家“不出门,不聚会”阻断和隔离传染的号召,我们将推迟此次会议,原定于2020年7月17-19的会议延期至2021年7月16-18日在昆明举行(官网:http://www.confjuly.org/conference/ISNS2021/)。如给您造成不便,我们非常抱歉,望谅解。 信息安全与网络安全国际研讨会 (ISNS 2021)将于2021年7月16-18日在中国昆明举行。ISNS 2021旨在为业内专家学者分享技术进步和业务经验,聚焦信息安全与网络安全等相关领域的前沿研究,提供一个交流的平台。本届大会将继续遵循学术性、国际性的原则,特邀国内外信息安全与网络安全等相关领域内的学者专家前来参会,并做出精彩的报告。 △.文章出版 所有被会议录用的稿件将会发表在开源期刊,被知网学术、谷歌学术等收录。 △.投稿须知: 论文应具有学术或实用价值,未在国内外学术期刊或会议发表过。 论文排版格式以及投稿方式详见网站说明。 审稿流程:本次会议采用先投稿,先送专家评审的方式进行,审稿周期约1周。 △.参会方式(注:会议有Oral Presentation以及Poster环节) 1.全文参会:提交全文并发表,申请参与10-15分钟的口头报告,3600元 2.摘要参会:提交摘要,申请参与10-15分钟的口头报告,2700元 3.听众参会:只参会听讲,不参与演讲及展示,2400元 △. 大会咨询 联系人:张老师 邮箱:intelconf@163.com QQ:1349406763 电话:132 6470 2250 微信:3025797047 △. 大会议题 Access Control Anti-Virus and Anti-Worms Authentication and Authorization Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Biometric Security Complex Systems Security Cryptography Data and System Integrity Database Security Distributed Systems Security Data Protection Electronic Commerce Security Fraud Control Grid Security High Performance Network Virtualization High Performance Security Systems Hardware Security Information Hiding and Watermarking Information Privacy Information Security Engineering Intellectual Property Protection Intrusion Detection Internet and Network Forensics Intrusion Detection and Prevention Key Management and Key Recovery Language-based Security Large-scale Attacks and Defense Network Security Risk Evaluation and Security Certification Security and Privacy for Social Computing Security Evaluation Security for Mobile Computing Security Models Security Protocols Signature and Key Agreement Protocol Software Security System Security Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing and Trustworthy Computing Technology
Last updated by Lin Ru in 2020-06-19
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICRCC | International Conference on Radar, Communication and Computing | 2016-09-15 | 2016-08-13 |
SCOM | International Conference on Soft Computing | 2020-11-29 | 2020-12-12 |
WoTBD | International Symposium on Web of Things and Big Data | 2015-08-30 | 2015-10-06 |
ICT4AWE | International Conference on Information and Communication Technologies for Ageing Well and e-Health | 2015-12-07 | 2016-04-21 |
ICSPAC | International Conference on Security, Pattern Analysis, and Cybernetics | 2017-08-30 | 2017-12-15 |
ICSAI | International Conference on Systems and Informatics | 2021-07-31 | 2021-11-13 |
WAPL | International Workshop on Advances in Programming Languages | 2011-09-18 | |
MSE' | International Conference on Materials Science and Engineering | 2023-04-29 | 2023-05-13 |
ICIP | International Conference on Image Processing | 2022-02-16 | 2022-10-16 |
ICCATE | International Conference on Computers and Advanced Technology in Education | 2012-12-10 | 2013-01-14 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
b | ACM Transactions of Information and System Security | ACM | 1094-9224 | |
International Journal of Information Security | 1.988 | Springer | 1615-5262 | |
c | IET Information Security | 0.862 | IET | 1751-8709 |
c | Behaviour & Information Technology | 1.388 | Taylor & Francis | 0144-929X |
a | IEEE Transactions on Information Forensics and Security | 6.211 | IEEE | 1556-6013 |
Information Security Technical Report | Elsevier | 1363-4127 | ||
Journal of King Saud University - Computer and Information Sciences | 8.839 | Elsevier | 1319-1578 | |
c | Information Management & Computer Security | Emerald | 0968-5227 | |
c | EURASIP Journal on Information Security | Springer | 1687-417X | |
New Ideas in Psychology | 2.621 | Elsevier | 0732-118X |
Full Name | Impact Factor | Publisher |
---|---|---|
ACM Transactions of Information and System Security | ACM | |
International Journal of Information Security | 1.988 | Springer |
IET Information Security | 0.862 | IET |
Behaviour & Information Technology | 1.388 | Taylor & Francis |
IEEE Transactions on Information Forensics and Security | 6.211 | IEEE |
Information Security Technical Report | Elsevier | |
Journal of King Saud University - Computer and Information Sciences | 8.839 | Elsevier |
Information Management & Computer Security | Emerald | |
EURASIP Journal on Information Security | Springer | |
New Ideas in Psychology | 2.621 | Elsevier |
Recommendation