Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

Int'l Conference on Information Security and Network Security (ISNS 2021)

ISNS 2021

Date of beginning

Friday, 16 July 2021

Duration

3 days

Deadline for abstracts

Wednesday, 16 June 2021

City

Kunming

Country

中国

Contact

Sarah

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

100

Memo

Int'l Conference on Information Security and Network Security (ISNS 2021) Conference Date: July 16-18, 2021 Conference Venue: Kunming, China Website: https://www.confjuly.org/conference/ISNS2021/ Online Registration System: https://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1369 Email: This email address is being protected from spambots. You need JavaScript enabled to view it. Important NOTE: Due to COVID-19 epidemic situation all over the world, most countries still maintain a strict policy of no-gathering, no-entering and leaving the country, and 14-days quarantine. We have to postpone the conference till July 16-18, 2021 in Kunming, China. Please visit the official website to get more details: http://www.confjuly.org/conference/ISNS2021/ Int'l Conference on Information Security and Network Security (ISNS 2021) will be held from July 16-18, 2021 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields. If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap. Publication and Presentation Publication: Open Access Journal, please contact us for detailed information Index: CNKI and Google Scholar Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System. Contact Us Email: This email address is being protected from spambots. You need JavaScript enabled to view it. Tel: +86 132 6470 2250 QQ: 1349406763 WeChat: 3025797047 Attendance Methods Submit full paper (Regular Attendance+Paper Publication+Presentation) You are welcome to submit full paper, all the accepted papers will be published by Open access journal. 2. Submit abstract (Regular Attendance+Abstract+Presentation) 3. Regular Attendance (No Submission Required) Conference Topics Access Control Anti-Virus and Anti-Worms Authentication and Authorization Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Biometric Security Complex Systems Security Cryptography Data and System Integrity Database Security Distributed Systems Security Data Protection Electronic Commerce Security Fraud Control Grid Security High Performance Network Virtualization High Performance Security Systems Hardware Security Information Hiding and Watermarking Information Privacy Information Security Engineering Intellectual Property Protection Intrusion Detection Internet and Network Forensics Intrusion Detection and Prevention Key Management and Key Recovery Language-based Security Large-scale Attacks and Defense Network Security Risk Evaluation and Security Certification Security and Privacy for Social Computing Security Evaluation Security for Mobile Computing Security Models Security Protocols Signature and Key Agreement Protocol Software Security System Security Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing and Trustworthy Computing Technology