2016 4th International Conference on Information and Network Security (ICINS 2016) will be held on December 28-31, 2016 in Kuala Lumpur, Malaysia. The aim of ICINS 2016 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Information and Network Security. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.
Submitted conference papers will be reviewed by technical committees of the Conference.
Accepted papers (Registered & Presented) will be published in the International Conference Proceedings Series by ACM, which will be archived in the ACM Digital Library, and indexed by Ei Compendex and Scopus and submitted to be reviewed by Thomson Reuters Conference Proceedings Citation Index (ISI Web of Science).
The conference is soliciting state-of-the-art research papers in the following areas of interest:
Security of Web-based applications and services
Anti-malware techniques: detection, analysis, and prevention
Intrusion prevention, detection, and response
Security for electronic voting
Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques
Privacy and anonymity technologies
Network perimeter controls: firewalls, packet filters, and application gateways
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Security for Vehicular Ad-hoc Networks (VANETs)
Security for peer-to-peer and overlay network systems
Security for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensing
Implementation, deployment and management of network security policies
Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management
Integrating security services with system and application security facilities and protocols
Public key infrastructures, key management, certification, and revocation
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, reliability and cost
Security for collaborative applications: teleconferencing and video-conferencing
Software hardening: e.g., detecting and defending against software bugs (overflows, etc.)
Security for large-scale systems and critical infrastructures
Integrating security in Internet protocols: routing, naming, network management
12月28日
2016
12月31日
2016
终稿截稿日期
注册截止日期
留言