International Conference on Security and its Applications
全文截稿: 2019-03-02
开会时间: 2019-05-25
会议难度: ★★
CCF分类: 无
会议地点: Vancouver, Canada
网址:https://ccseit2019.org/cnsa/index.html
Topics of Interest Network and Wireless Network Security Mobile, Ad Hoc and Sensor Network Security Peer-to-Peer Network Security Database and System Security Intrusion Detection and Prevention Internet Security & Applications Security & Network Management E-mail Security, Spam, Phishing, E-mail fraud Virus, Worms, Trojan Protection Security threats & Countermeasures (DDoS, MiM, Session Hijacking,Replay attack etc,) Ubiquitous Computing Security Web 2.0 security Cryptographic Protocols Performance Evaluations of Protocols & Security Application
信息安全及密码学
SITN 2019
International Workshop on Securing IoT Networks
全文截稿: 2019-03-10
开会时间: 2019-08-19
会议难度: ★★
CCF分类: 无
会议地点: London, UK
网址:http://collaboratecom.org/workshop-sitn/
The Internet of Things (IoT) presents unprecedented opportunities for building smart society. Big data collected from numerous “Things”, connected to different interfaces and locations, facilitate smarter decision making and personalised services. Although all the hope of anticipated benefits from IoT, security remains a big challenge to overcome. Manufacturers are yet shipping IoT devices with security flaws, which put users or even the other parts of our connected cyber world at risk. Those vulnerable IoT devices would be easily exploited to launch massive cyber attacks to other online services or IT infrastructures. All the privacy, robustness and security issues are challenging the movement towards smart society.
信息安全及密码学
CRiSIS 2019
International Conference on Risks and Security of Internet and Systems
全文截稿: 2019-06-09
开会时间: 2019-10-29
会议难度: ★★
CCF分类: 无
会议地点: Hammamet, Tunisia
网址:http://crisis2019.redcad.org
The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.). The list of topics includes but is not limited to:
Analysis and management of risk Attacks and defenses Attack data acquisition and network monitoring Cryptography, biometrics, watermarking Dependability and fault tolerance of Internet applications Distributed systems security and safety Embedded system security and safety Empirical methods for security and risk evaluation Hardware-based security and physical security Intrusion detection and prevention systems Organizational, ethical and legal issues Privacy protection and anonymization Risk-aware access and usage control Security and risk assessment Security and risks metrics Security and dependability of operating systems Security and safety of critical infrastructures Security and privacy of peer-to-peer system Security and privacy of wireless networks Security models and security policies Security of new generation networks, security of VoIP and multimedia Security of e-commerce, electronic voting and database systems Security of social networks Security of industrial control systems Smartphone security and privacy Traceability, metrology and forensics Trust management Use of smart cards and personal devices for Internet applications Web and cloud security