ICNSCE 2018 - International Conference on Network Security and Computer Engineering 2018
Date2018-11-21 - 2018-11-23
Deadline2018-08-30
VenueKuala Lumpur, Malaysia
KeywordsNetwork Security; Biometric Se; Computer Engineering; Authentication; Data Protectio
Topics/Call fo Papers
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Applied Cryptography
Authentication
Biometric Security
Complex Systems Security
Database and System Security
Data Protection
Data/System Integrity
Distributed Access Control
Distributed Attack Systems
Denial-of-Service
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Identity Management
Intelligent Defense Systems
Insider Threats
Internet and Network Forensics
Intrusion Detection and Prevention
Key Distribution and Management
Large-scale Attacks and Defense
Malware
Network Resiliency
Network Security
RFID Security and Privacy
Security Architectures
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing
Trust Management
World Wide Web Security
Computer Architecture
Computer Modeling
Computer-aided Design
Automated Software Engineering
Computer Networks
Digital System and Logic Design
Multimedia Applications
Wireless Sensor Network
Network Security and Cryptography
Bioinformatics and Scientific Computing
Computer Animation
Digital Signal and Image Processing
Expert Systems
Internet and Web Applications
Social Media
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Applied Cryptography
Authentication
Biometric Security
Complex Systems Security
Database and System Security
Data Protection
Data/System Integrity
Distributed Access Control
Distributed Attack Systems
Denial-of-Service
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Identity Management
Intelligent Defense Systems
Insider Threats
Internet and Network Forensics
Intrusion Detection and Prevention
Key Distribution and Management
Large-scale Attacks and Defense
Malware
Network Resiliency
Network Security
RFID Security and Privacy
Security Architectures
Security for Critical Infrastructures
Security in P2P systems
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing
Trust Management
World Wide Web Security
Computer Architecture
Computer Modeling
Computer-aided Design
Automated Software Engineering
Computer Networks
Digital System and Logic Design
Multimedia Applications
Wireless Sensor Network
Network Security and Cryptography
Bioinformatics and Scientific Computing
Computer Animation
Digital Signal and Image Processing
Expert Systems
Internet and Web Applications
Social Media
Other CFPs
- Resolving Construction Disputes Using Alternative Dispute Resolution
- Photon 2018 - Optics and Photonics conference
- Drafting a Software Verification and Validation Report Package and Protocol - The 11 Must-have Documents
- Siem Reap 2nd International Conference on “Medical, Medicine and Health Sciences” (MMHS- 2018 Siem Reap, Cambodia)
- Siem Reap 1st International Conference on “Medical, Medicine and Health Sciences” (MMHS- 2018 Siem Reap, Cambodia)
Last modified: 2018-07-24 22:28:08