ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISNS 2025 - The 5th Int'l Conference on Information Security and Network Security(ISNS 2025)

Date2025-07-18 - 2025-07-20

Deadline2025-07-02

VenueKunming, China, China China

KeywordsInformation Security; Network Security

Websitehttps://www.academicx.org/ISNS/2025

Topics/Call fo Papers

The 5th Int'l Conference on Information Security and Network Security(ISNS 2025)
Website:https://www.academicx.org/ISNS/2025/
Date:July 18-20, 2025
Venue: Kunming, China
The 5th Int'l Conference on Information Security and Network Security (ISNS 2025) will be held during July 18-20, 2025 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields. Attendees will have the opportunity to showcase their research progress, discover emerging trends, and network with fellow professionals in a collaborative environment.
Kunming, also known as Yunnan-Fu, is the capital and largest city of Yunnan province, China. It is the political, economic, communications and cultural centre of the province as well as the seat of the provincial government. The headquarters of many of Yunnan's biggest corporations are based in the city. The city was of great significance during World War II as a Chinese military center, American air base, and transport terminus for the Burma Road. In the middle of the Yunnan–Guizhou Plateau, Kunming is at an altitude of 1,900 metres (6,234 feet) above sea level and a latitude just north of the Tropic of Cancer. As of 2020 census, Kunming had a total population of 8,460,088 inhabitants, of whom 5,604,310 lived in its built-up (or metro) area made of all urban districts but Jinning, not conurbated yet. It is at the northern edge of Dian Lake, surrounded by temples and lake-and-limestone hill landscapes.
We're looking forward to seeing you in Kunming!
Attendance Methods
1.Regular Attendance ( No Submission Required )
You're also welcome to attend our conference (without submitting full paper or abstract)
2.Abstract submission
Submit abstract ( Regular Attendance + Abstract + Presentation )
You are welcome to submit abstract for oral presentation or poster presentation.
3. Full Paper submission
Submit full paper ( Regular Attendance + Paper Publication + Presentation )
You are invited to submit papers and participate in our academic exchange. One author will be invited to make an oral presentation and the paper will be published by peer-reviewed open access journal.
Publication and Presentation
Publication: All the accepted papers will be published by a peer-reviewed open access journal that can ensure the widest dissemination of your published work, for more information, please contact us (contact7-AT-academicx.org).
Index: CNKI and Google Scholar
Note:
1. Manuscripts should be submitted by one of the authors of the manuscript through the online registration/submission system or official email.
2. If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract only.
3. All manuscripts are expected to be prepared as a single PDF or MS Word document with the complete text, references, tables and figures included. Any revised manuscripts prepared for publication should be sent as a single editable Word document. LaTex paper is also acceptable for publication, but it should be in PDF for review first.
4. Please click Template for Manuscripts button to download the Full Paper template and prepare your article according to it. The full length of one paper is suggested to be about 15 pages (within the template format with all tables, figures and references). If your paper is over 20 pages, you will be kindly requested to pay for extra pages fees.
5. The simple Abstract submission should include the title, contents, keywords, authors names, affiliations and emails. The length is suggested to be controlled within 1 page and no more than 2 pages.
6. You will receive the review results within 5-7 working days after submission. If you do not get any notification within the time limit, please contact us as soon as possible.
7. You are welcome to submit papers in Chinese and please contact us for more details.
Contact Us
Email:contact7-AT-academicx.org (intelconf-AT-163.com)
Whatsapp: 0086 18672346485
Tel: +86 18627814037
QQ: 1349406763
WeChat: 18627814037 / 3025797047
Official Account: Academic Communications
Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:
Anti-Virus and Anti-Worms Trusted Computing and Trustworthy Computing Technology
Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
Security in Cloud and Grid Systems
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Standards and Assurance Methods

Last modified: 2024-11-06 17:05:49