No description added

Call For Papers

2022 Int'l Conference on Information Security and Network Security (ISNS 2022)

Conference Date: July 15-17, 2022Conference Venue: Chengdu, ChinaWebsite: Registration System:

2022 Int'l Conference on Information Security and Network Security (ISNS 2022) will be held during July 15-17, 2022 in Chengdu, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.  

If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap.

Publication and Presentation

Publication: Open Access Journal,please contact us for detailed informationIndex: CNKI and Google ScholarNote: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.

Contact Us

Email: ( +86 13296503784 (Monday to Friday)QQ: 1349406763WeChat: 3025797047Official Account: Academic Communications

Attendance Methods

1.Submit full paper (Regular Attendance+Paper Publication+Presentation)You are welcome to submit full paper, all the accepted papers will be published by Open access journal.2. Submit abstract (Regular Attendance+Abstract+Presentation)3. Regular Attendance (No Submission Required) 

Conference Topics

Access ControlAnti-Virus and Anti-WormsAuthentication and AuthorizationActive Defense SystemsAdaptive Defense SystemsAnalysis, Benchmark of Security SystemsBiometric SecurityComplex Systems SecurityCryptographyData and System IntegrityDatabase SecurityDistributed Systems SecurityData ProtectionElectronic Commerce SecurityFraud ControlGrid SecurityHigh Performance Network VirtualizationHigh Performance Security SystemsHardware SecurityInformation Hiding and WatermarkingInformation PrivacyInformation Security EngineeringIntellectual Property ProtectionIntrusion DetectionInternet and Network ForensicsIntrusion Detection and PreventionKey Management and Key RecoveryLanguage-based SecurityLarge-scale Attacks and DefenseNetwork SecurityRisk Evaluation and Security CertificationSecurity and Privacy for Social ComputingSecurity EvaluationSecurity for Mobile ComputingSecurity ModelsSecurity ProtocolsSignature and Key Agreement ProtocolSoftware SecuritySystem SecuritySecurity in Cloud and Grid SystemsSecurity in E-CommerceSecurity in Pervasive/Ubiquitous ComputingSecurity and Privacy in Smart GridSecurity and Privacy in Wireless NetworksSecure Mobile Agents and Mobile CodeSecurity PolicySecurity ProtocolsSecurity Simulation and ToolsSecurity Theory and ToolsStandards and Assurance MethodsTrusted Computing and Trustworthy Computing Technology