| |||||||||||
ICNS--Ei and Scopus 2019 : 2019 The 4th International Conference on Network Security (ICNS 2019)--Ei Compendex, SCOPUS | |||||||||||
Link: http://www.icns.org/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
2019 The 4th International Conference on Network Security (ICNS 2019)--Ei Compendex, SCOPUS
2019 The 4th International Conference on Network Security (ICNS 2019) will be held in Luoyang, China, December 13-15, 2019 (http://www.icns.org/).This conference will provide a platform for participants to discuss the latest research findings and future research in the fields of Network Security. Accepted and registered full papers of ICNS 2019 will be collected in conference proceedings, which will be indexed by Ei & Scopus. *History - ICNS 2018 | Taipei, China Full papers of ICNS 2018 published in International Conference Proceedings Series by ACM (ISBN: 978-1-4503-6553-6). -ICNS 2017 | Kungming, China Proceedings by ACM (ISBN: 978-1-4503-5366-3) has been online and EI & Scopus indexed. -ICNS 2016 | Kyoto, Japan Proceedings by ACM (ISBN:978-1-4503-4793-8) has been online and EI & Scopus indexed. *Venue Henan University of Science and Technology (HAUST) Add: 263, Kaiyuan Avenue, Luoyang, China *Call for Paper: http://www.icns.org/cfp.html Active Defense Systems Adaptive Defense Systems Analysis, Benchmark of Security Systems Applied Cryptography Authentication Biometric Security Complex Systems Security Database and System Security Data Protection Data/System Integrity Distributed Access Control Distributed Attack Systems Denial-of-Service High Performance Network Virtualization High Performance Security Systems Security in Cloud and Grid Systems Security in E-Commerce Security in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grid Security and Privacy in Wireless Networks Secure Mobile Agents and Mobile Code Security Policy Security Protocols Security Simulation and Tools Security Theory and Tools Standards and Assurance Methods Trusted Computing Trust Management World Wide Web Security Security in P2P systems Hardware Security Identity Management Intelligent Defense Systems Insider Threats Internet and Network Forensics Intrusion Detection and Prevention Key Distribution and Management Large-scale Attacks and Defense Malware Network Resiliency Network Security RFID Security and Privacy Security Architectures Security for Critical Infrastructures *Submission By online submission system: http://confsys.iconf.org/submission/icns2019 *Contact Ms Tina T. Wang Email: icns@zhconf.ac.cn Tel: +86-028-8652-8629 |
|