ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISNS 2024 - The 4th Int'l Conference on Information Security and Network Security (ISNS 2024)

Date2024-07-19 - 2024-07-21

Deadline2024-06-19

VenueXi’an, China China

KeywordsInformation Security; Network Security

Websitehttps://www.academicx.org/ISNS/2024

Topics/Call fo Papers

The 4th Int'l Conference on Information Security and Network Security (ISNS 2024)
Website:https://www.academicx.org/ISNS/2024/
Date:July 19-21, 2024
Venue:Xi’an,China
The 4th Int'l Conference on Information Security and Network Security (ISNS 2024) will be held during July 19-21, 2024 in Xi'an, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.
Attendance Methods
1. Full Paper submission
Submit full paper ( Regular Attendance + Paper Publication + Presentation )
You are invited to submit papers and participate in our academic exchange. One author will be invited to make an oral presentation and the paper will be published by peer-reviewed open access journal and submitted to CNKI and Google Scholar for indexing.
2.Abstract submission
Submit abstract ( Regular Attendance + Abstract + Presentation )
You are welcome to submit abstract for oral presentation or poster presentation.
3.Regular Attendance ( No Submission Required )
You're also welcome to attend our conference (without submitting full paper or abstract).
Publication and Presentation
Publication: All the accepted papers will be published by a peer-reviewed open access journal that can ensure the widest dissemination of your published work. For more information, please contact us (intelconf-AT-163.com).
Index: CNKI and Google Scholar
Note: 1. If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.
2. Please click Template for Manuscripts (below the Registration button at the top left corner) to download the Full Paper template and prepare your article according to it. The full length of one paper is suggested to be 8-10 pages (within the template format with all tables, figures and references). If your paper is over 10 pages, you will be kindly requested to pay for extra page fees.
3. The simple Abstract submission should include the title, contents, keywords, authors names, affiliations and emails. The length is suggested to be controlled within 1 page and no more than 2 pages.
4. You will receive the review results within 3-5 working days after submission. If you do not get any notification within the time limit, please contact us as soon as possible.
5. You are welcome to submit papers in Chinese and please contact us for more details.
Contact Us
Email: intelconf-AT-163.com
Whatsapp: 0086 13264702250
Tel: +86 13296503784 (Monday to Friday)
QQ: 1349406763
WeChat: 3025797047
Official Account: Academic Communications
Twitter: conf_Committee
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Anti-Virus and Anti-Worms Trusted Computing and Trustworthy Computing Technology
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
Security in Cloud and Grid Systems
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Standards and Assurance Methods

Last modified: 2023-11-03 18:35:02