征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

2016 4th International Conference on Information and Network Security (ICINS 2016) will be held on December 28-31, 2016 in Kuala Lumpur, Malaysia. The aim of ICINS 2016 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information and Network Security. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

Submitted conference papers will be reviewed by technical committees of the Conference.
Accepted papers (Registered & Presented) will be published in the International Conference Proceedings Series by ACM, which will be archived in the ACM Digital Library, and indexed by Ei Compendex and Scopus and submitted to be reviewed by Thomson Reuters Conference Proceedings Citation Index (ISI Web of Science).

征稿信息

重要日期

2016-10-30
终稿截稿日期

征稿范围

The conference is soliciting state-of-the-art research papers in the following areas of interest:

  • Security of Web-based applications and services

  • Anti-malware techniques: detection, analysis, and prevention

  • Intrusion prevention, detection, and response

  • Security for electronic voting

  • Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques

  • Privacy and anonymity technologies

  • Network perimeter controls: firewalls, packet filters, and application gateways

  • Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems

  • Security for Vehicular Ad-hoc Networks (VANETs)

  • Security for peer-to-peer and overlay network systems

  • Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing

  • Implementation, deployment and management of network security policies

  • Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management

  • Integrating security services with system and application security facilities and protocols

  • Public key infrastructures, key management, certification, and revocation

  • Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost

  • Security for collaborative applications: teleconferencing and video-conferencing

  • Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)

  • Security for large-scale systems and critical infrastructures

  • Integrating security in Internet protocols: routing, naming, network management

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月28日

    2016

    12月31日

    2016

  • 10月30日 2016

    终稿截稿日期

  • 12月31日 2016

    注册截止日期

联系方式
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询