JUL 16

Int'l Conference on Information Security and Network Security (ISNS 2021)

ISNS 2021   

Conference CFP




  16 Jul 2021 through 18 Jul 2021

CFP Deadline:

  16 Jun 2021


  Kunming, China

Website URL:



  Engineering & Technology > Computer/Informatics

Cloud tags:

Event description:

Int'l Conference on Information Security and Network Security (ISNS 2021) Conference Date: July 16-18, 2021 Conference Venue: Kunming, China Website: https://www.confjuly.org/conference/ISNS2021/ Online Registration System: http://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1369 Email: [email protected] Int'l Conference on Information Security and Network Security (ISNS 2021) will be held from July 16-18, 2021 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields. If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap. Publication and Presentation Publication: Open Access Journal´╝îplease contact us for detailed information Index: CNKI and Google Scholar Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System. Contact Us Email: [email protected] Tel: +86 132 6470 2250 QQ: 1349406763, 3025797047 WeChat: 3025797047 Attendance Methods 1.Submit full paper (Regular Attendance+Paper Publication+Presentation) You are welcome to submit full paper, all the accepted papers will be published by Open access journal. 2. Submit abstract (Regular Attendance+Abstract+Presentation) 3. Regular Attendance (No Submission Required) Conference Topics Access Control Anti-Virus and Anti-Worms Authentication and Authorization Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Biometric Security Complex Systems Security Cryptography Data and System Integrity Database Security Distributed Systems Security Data Protection Electronic Commerce Security Fraud Control Grid Security High Performance Network Virtualization High Performance Security Systems Hardware Security Information Hiding and Watermarking Information Privacy Information Security Engineering Intellectual Property Protection Intrusion Detection Internet and Network Forensics Intrusion Detection and Prevention Key Management and Key Recovery Language-based Security Large-scale Attacks and Defense Network Security Risk Evaluation and Security Certification Security and Privacy for Social Computing Security Evaluation Security for Mobile Computing Security Models Security Protocols Signature and Key Agreement Protocol Software Security System Security Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing and Trustworthy Computing Technology

Posting date:

26 December 2019
views | 1 subscribers | Be the first to rate this event


Not-featured (How do I make my event featured?)