2023 International Conference on Network and Information Security (NISecurity 2023)
Added by zoekwong123 on 2023-03-06
Conference Dates:
Start Date: 2023-10-13Last Day: 2023-10-15
Deadline for abstracts/proposals: 2023-08-30
Conference Contact Info:
Contact Person: Ms. Chris Y. CheungEmail: [email protected]
Address: Hangzhou, Hangzhou, China
Conference Description:
2023 International Conference on Network and Information Security (NISecurity 2023)-- Ei Compendex & Scopus—Call for paperOctober 13-15, 2023-Hangzhou, China -Website: www.nisecurity.org
NISecurity 2023 provides researchers and industry experts with one of the best platforms to meet and discuss groundbreaking research and innovations in the field of Network and Information Security.
International invited speakers are invited to present their state-of-the-art work on various aspects, which will highlight important and developing areas.
Publication and Indexing
Conference presented and registered full paper will be included in digital conference proceeding, and submitted to major citation databases like Ei Compendex, SCOPUS, Google Scholar etc. for reviewing and indexing.
A selection of good papers can be recommended to submit to journals for publication after significant extension.
Paper Submission
1.SubmitVia CMT: https://cmt3.research.microsoft.com/User /Login?ReturnUrl=%2FNISecurity2023
2.2.Send your manuscript as an attachment to the conference email:[email protected]
CONTACT US
Ms. Chris Y. Cheung
Email: [email protected]
Website: www.nisecurity.org
Call for papers(http://www.nisecurity.org/cfp):Access Control and Intrusion Detection
Privacy and Authentication
Artificial Immune Systems
Quantum Cryptography
Authentication
Regulation and Trust Mechanisms
Authentication and Non-repudiation
Reinforcement & Unsupervised Learning
Autonomy-Oriented Computing
Secure Cloud Computing
Biological & Evolutionary Computation
Security & Network Management
Biometric Security
Security and Privacy in Mobile Systems
Coevolutionary Algorithms
Security and Privacy in Pervasive and Ubiquitous Computing
Computational Intelligence in Security
Security and Privacy in Web Sevices
Cryptographic protocols
Security and Privacy Policies
Cryptographic Protocols
Security Area Control
Cryptography and Coding
Security Deployment
Data Integrity
Security Engineering
Database and System Security
Security for Grid Computing
DDoS, MiM, Session Hijacking, Replay attack
Security in Distributed Systems
E-mail security, Spam, Phishing, E-mail fraud
Security Information Systems Architecture and Design and Security Patterns
Fuzzy Systems
Security Management
Identification and Authentication
Security Requirements
Insider Threats and Countermeasures
Security threats & countermeasures
Intelligent Agents and Systems
Sensor and Mobile Ad Hoc Network Security
Internet Security & Applications
Service and Systems Design and QoS Network Security
Intrusion Detection & Prevention
Software Security
Intrusion Detection and Prevention
Threats, Vulnerabilities, Risk, Formal Methods
Intrusion Detection and Vulnerability Assessment
Trust Management
Key Management
Trust Models and Metrics
Mobile, Ad Hoc and Sensor Network Security
Ubiquitous Computing Security
Models for Authentication, Trust and Authorization
Untraceability
Network and Wireless Network Security
Virus, worms, Trojan Protection
Peer-to-Peer Network Security
Web 2.0 security
Performance Evaluations of Protocols & Security Application