Photos
Information
Starts: 15.07.2022 08:30
Ends: 17.07.2022 17:00
Location:
Chengdu Xinliang Hotel
NO. 246, Upper Shangdong Section, Dongda Ave, Chengdu
Chengdu, Sichuan
China
Promoter
NameChengdu Xinliang Hotel
Telephone13296503784
Email[email protected]
Description

2022 Int'l Conference on Information Security and Network Security (ISNS 2022)

Conference Date: July 15-17, 2022
Conference Venue: Chengdu, China
Website: http://www.confjuly.org/conference/ISNS2022
Online Registration System: https://www.confjuly.org/RegistrationSubmission/default.aspx?ConferenceID=1494
Email: [email protected]

2022 Int'l Conference on Information Security and Network Security (ISNS 2022) will be held during July 15-17, 2022 in Chengdu, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.  


If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap.

Publication and Presentation

Publication: Open Access Journal,please contact us for detailed information
Index: CNKI and Google Scholar
Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.

Contact Us

Email: [email protected] ([email protected])
Tel: +86 13296503784 (Monday to Friday)
QQ: 1349406763
WeChat: 3025797047
Official Account: Academic Communications

Attendance Methods

1.Submit full paper (Regular Attendance+Paper Publication+Presentation)
You are welcome to submit full paper, all the accepted papers will be published by Open access journal.
2. Submit abstract (Regular Attendance+Abstract+Presentation)
3. Regular Attendance (No Submission Required) 

Conference Topics

Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Cryptography
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
Grid Security
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing and Trustworthy Computing Technology

Comments
Order by: 
Per page:
 
  • There are no comments yet
Location
Location is undefined
Venues
Empty
Administrators
Empty
Rate
0 votes
Recommend
Participants
Empty