征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The World Congress on Internet Security (WorldCIS-2014) is Technical Co-sponsored by IEEE UK/RI Computer Chapter. The WorldCIS is an international refereed conference dedicated to the advancement of the theory and practical implementation of security on the Internet and Computer Networks. The inability to properly secure the Internet, computer networks, protecting the Internet against emerging threats and vulnerabilities, and sustaining privacy and trust has been a key focus of research. The WorldCIS aims to provide a highly professional and comparative academic research forum that promotes collaborative excellence between academia and industry. The objectives of the WorldCIS are to bridge the knowledge gap between academia and industry, promote research esteem and to fostering discussions on information technologies, information systems and global security applications. The WorldCIS-2014 invites speakers and researchers to submit papers that encompass conceptual analysis, design implementation and performance evaluation. All submitted papers are peer-reviewed (blind reviewed).

征稿信息

征稿范围

Original papers are invited on recent advances in Internet, Computer Communications and Networking Security. The topics in WorldCIS-2014 include but are not confined to the following areas: Access Control Accountability Anonymity Application security Attacks and defenses Authentication Censorship and censorship-resistance Distributed systems security Embedded systems security Intrusion detection Language-based security Malware Metrics Network security Privacy-preserving Resource usage control Security for mobile computing Security models systems Protocol security Secure information flow Security and privacy policies Security architectures System security Usability and security Web security Internet Application and Technology Internet Architecture and Technologies Anonymity and Privacy Artificial Intelligence and Expert Systems Network security Broadband Access Technologies Application Agents Boundary Issues of Internet Security Database Management Data Models for Production Systems and Services Data Provenance Defence Systems Internet Security Electronic voting Embedded Systems IPSec Quality of Service Knowledge Management Modeling and verifying Security, Trust and Privacy Self-Organizing Networks Sensor nets and embedded systems Service overlays Switches and switching Topology characterization and Inference Traffic Measurement and Analysis Traffic Engineering and Control Data Security Virtual and Overlay Networks Quantification of Integrity Cyber warfare and Cyber Security Surveillance Systems Cyber Warfare Trends and Approaches Social engineering Template Protection and Liveliness detection New theories and algorithms in biometrics Formal Methods Application in Security Operating Systems and Database Security nterprise Systems Security SCADA and Embedded systems security Distributed and Pervasive Systems Security Secure Software Development Information Security Biometrics Chaos-based Data Security Cryptography Collaborative Learning Cyber Security Congestion control Content Distribution Cross Layer Design and Optimization Cyber-physical computing/networking Distributed Systems Security Information flow monitor Language-based security Network Security Issues and Protocols Security Challenges and Content Authoring Secure Communications Authentication Techniques MANET Security Wireless Sensor Network Security Organization Considerations in Security Policy Digital Forensics and Crimes Formulation and Implementations Geographic information systems Privacy Protection Regulations Quantitative Information Flow Multimedia and Web Services Intelligent Multimedia and its Data Management Multimedia Information Systems Multimedia Security Web Databases Web Metrics and its Applications Web Mining including Web Intelligence and Web 3.0. XML and other extensible languages Semantic Web and Ontology Web services and performance Secured Database Systems Security in Data Mining Defence Systems Virtual Reality Hardware-Based Security Trust and trust management Electronic Society Trust, Privacy and Data Security Anonymity, Pseudonymity, and Unlinkability data Correlation and Leakage Attacks Privacy Enhancing Technologies Wireless Privacy User Profiling Information Dissemination Control Dynamic vs. Static Flow-Sensitive Security Analysis Digital Forensic Data leakage and Database forensics Forensics of Virtual and Cloud Environments Network Forensics and Traffic Analysis Information Hiding File System and Memory Analysis Executable Content and Content Filtering Anti-Forensics Techniques Malware forensics Evidentiary Aspects of Digital Forensics Large-Scale Investigations New threats and Non-Traditional approaches Incident Handling and Penetration Testing Network Security Ad hoc Mobile Networks Security Addressing and Location Management Broadband Access Technologies Blended Internet Security Methods Boundary Issues of Internet Security Capacity Planning Cellular and Broadband Wireless Nets Complex systems and complexity Formal verification of privacy for RFID systems Optical Networks Middleware Support for Networking Mobility Models and Systems Multicast and Anycast Multimedia Protocols and Networking Network Applications and Services Network Architectures Network Simulation and Emulation Novel Network Architectures Network and Protocol Architectures Peer-to-Peer Communications Performance Evaluation Power Control and Management Protocols and Standards Resource Allocation and Management Wireless Mesh Networks and Protocols Ubiquitous Computing Context-Awareness and its Data Mining for UbiCom Data Grids Distributed Information Systems Forensic in Ubi-com Human-Computer Interface and Interaction for UbiCom Ubiquitous Systems USN/RFID Service UbiCom Service Business Model Data Management for UbiCom Peer to Peer Data Management Ubiquitous Application Delay/disruption tolerant networks End Users Enabling Technologies for the Internet Implementation and Experimental Testbeds Quality of Service Issues Cloud Security Secure Virtual Infrastructure and Private Cloud Cryptographic Enforcement of Multi-Tenancy Cloud Requirements for PaaS and SaaS Security Policy and Privacy Requirements CloudAudit Protocol Corporate Governance Laws and Regulations Threats, Vulnerabilities, and Risk Management Disaster Recovery Planning Critical Infrastructure Protection Digital Rights Management Security Policies and Trust Management Identity Management Decidability and Complexity Economics of Security Fraud Management Research in Progress Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals Future Internet Design and Applications
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月08日

    2014

    12月10日

    2014

  • 12月10日 2014

    注册截止日期

主办单位
Infonomics Society
历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询