ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICIS 2022 - International Congress on Internet Security 2022

Date2022-08-11 - 2022-08-12

Deadline2022-07-10

VenueHong Kong, Hong Kong SAR Hong Kong SAR

KeywordsInternet Security; Networks; System

Websitehttps://intcongress.com/international-co...

Topics/Call fo Papers

Accountability
Anonymity
Application security
Attacks and defenses
Authentication
Censorship and censorship-resistance
Distributed systems security
Embedded systems security
Intrusion detection
Language-based security
Malware
Metrics
Network security
Privacy-preserving
Resource usage control
Security for mobile computing
Security models
systems Protocol security
Secure information flow
Formal verification of privacy for RFID systems
Complex systems and complexity
Security and privacy policies
Security architectures
System security
Usability and security
Web security
Biometrics
Chaos-based Data Security
Cryptography
Collaborative Learning
Cyber Security Congestion control
Content Distribution
Cross Layer Design and Optimization
Cyber-physical computing / networking
Distributed Systems Security
Information flow monitor
Language-based security
Network Security Issues and Protocols
Security Challenges and Content Authoring
Secure Communications
Cyber Laws
Authentication Techniques
MANET Security
Wireless Sensor Network Security
Organization Considerations in Security Policy
Digital Forensics and Crimes
Formulation and Implementations
Geographic information systems
Privacy Protection
Regulations
Quantitative Information Flow
Ad hoc Mobile Networks Security
Addressing and Location Management
Broadband Access Technologies
Blended Internet Security Methods
Boundary Issues of Internet Security
Capacity Planning
Cellular and Broadband Wireless Nets
Optical Networks
Middleware Support for Networking
Mobility Models and Systems
Multicast and Any cast
Multimedia Protocols and Networking
Network Applications and Services
Network Architectures
Network Simulation and Emulation
Novel Network Architectures
Network and Protocol Architectures
Peer-to-Peer Communications
Performance Evaluation
Power Control and Management
Protocols and Standards
Resource Allocation and Management
Wireless Mesh Networks and Protocols
Botnets
Social Media Security

Last modified: 2022-04-04 15:58:15