Información de la conferencia
ICCNS 2025: International Conference on Communication and Network Security
https://www.iccns.org/Día de Entrega: |
2025-08-01 |
Fecha de Notificación: |
2025-09-01 |
Fecha de Conferencia: |
2025-12-19 |
Ubicación: |
Jilin, China |
Años: |
15 |
Vistas: 23997 Seguidores: 16 Asistentes: 3
Solicitud de Artículos
The topics of interest include, but not limited to the following: - Track 1. Communication and Information Engineering Track Chair: Shaoshuai Gao, University of Chinese Academy of Sciences, China Track Chair: Yanping Zhang, Gonzaga University, USA Ad hoc & sensor networks Embedded networks High-speed access networks Home and SOHO networks IPv6 deployment & migration Local area networks Optical networks Overlay networks Peer-to-peer networks Personal and wearable networks Routing and Scheduling Storage area networks Ubiquitous networking Wireless networks Multimedia & real-time communication Network management Network reliability and security Network traffic characterization Cross-layer Design and Optimization Communication and Information Theory Communication Software and Services Protocol and Algorithms for Communications Wireless Communications and Networking Broadband Wireless Access Cooperative Communications and Networking Optical Communications and Networking Broadband Networking and Protocols Internet Services, Systems and Applications P2P Communications and Networking Pervasive Computing and Grid Networking Communication Network Security - Track 2. Information and network security Track Chair: Yu-Beng Leau, Universiti Malaysia Sabah, Malaysia Track Chair: Thuan Yew Edward Chuah, University of Aberdeen, UK Track Chair: Xuru Li, Shanghai Maritime University, China Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks Network Intrusion Detection and Prevention, Firewalls, Packet Filters Malware and botnets Communication Privacy and Anonymity Distributed denial of service Public Key Infrastructures, key management, credentials Web security Secure Routing, Naming/Addressing, Network Management Security & Privacy in Pervasive and Ubiquitous Computing Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems Information leakage Information theft Data tampering Data deletion computer virus Security breach Attack monitoring Encrypted communication Information dissemination safety Network isolation Application security Email security Anti-virus and anti-malware software Network segmentation Application security Behavioral analytics Cloud security Intrusion prevention systems Mobile device security Security information and event management Wireless security Track 3. Data security - 数据安全 Cryptography and Encryption Techniques: Advances in cryptographic algorithms and their applications in securing data. Data Integrity and Authenticity: Techniques for ensuring data is accurate and has not been altered maliciously. Cloud Security: Strategies for securing data stored in cloud environments, including access controls and encryption methods. Network Security Protocols: Examination of protocols that enhance data security during transmission. Machine Learning for Threat Detection: Utilizing AI and ML to identify and respond to potential security breaches in real-time. Application Security: Best practices for securing mobile and web applications against data breaches. Incident Response and Management: Approaches for rapid response to data security breaches and restoration of services. Security in IoT Devices: Challenges and solutions in securing data transmitted from Internet of Things devices. Data Backup and Recovery Solutions: Techniques for ensuring data availability and integrity in case of a breach. Regulatory Compliance: Understanding GDPR, HIPAA, and other regulations affecting data protection and security measures. Track 4. Privacy Protection - 隐私保护 Track Chair: Lijun Zhang, E-surfing Vision Technology Co., Ltd, China Telecom, China Data Anonymization Techniques: Methods to remove personal identifiers from datasets while maintaining data utility. User Consent and Data Collection: Implications of user consent management regarding data collection practices. Privacy by Design: Incorporating privacy measures into the development process of systems and services. Surveillance and Data Privacy: The impact of government and corporate surveillance on personal privacy. Privacy Enhancing Technologies (PETs): Tools and methodologies for enhancing individual privacy online. Blockchain for Privacy Protection: Exploring how blockchain can be used to enhance data privacy. Ethical Considerations in Data Handling: The role of ethics in data collection, processing, and sharing practices. Cross-Border Data Transfers: Legal and technical challenges related to transferring data across international borders. Consumer Privacy Rights: An analysis of consumer rights regarding their personal data under various regulations. Impact of AI on Privacy: The implications of artificial intelligence on personal privacy and data handling.
Última Actualización Por Dou Sun en 2025-08-02
Conferencias Relacionadas
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
LATINCOM | IEEE Latin-American Conference on Communications | 2024-08-05 | 2024-11-06 |
WASA | International Conference on Wireless Algorithms, Systems, and Applications | 2025-02-15 | 2025-06-24 |
ICCABS | IEEE International Conference on Computational Advances in Bio and Medical Sciences | 2016-08-01 | 2016-10-13 |
ICRCC | International Conference on Radar, Communication and Computing | 2016-09-15 | 2016-08-13 |
MMSP | International Workshop on Multimedia Signal Processing | 2024-06-19 | 2024-10-02 |
DCIT | International Symposium on Dependable Computing and Internet of Things | 2015-07-15 | 2015-11-16 |
FCTA | International Conference on Fuzzy Computation Theory and Applications | 2024-06-03 | 2024-11-20 |
SGGEA | Asia Conference on Smart Grid, Green Energy and Applications | 2025-11-10 | 2025-12-12 |
ICIFS | International Conference on Intuitionistic Fuzzy Sets | 2019-02-21 | 2019-05-16 |
Expressive | Joint Symposia on Sketch-Based Interfaces and Modeling, Non-Photorealistic Animation and Computational Aesthetics | 2015-03-28 | 2015-06-20 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
Combinatorica | 1.000 | Springer | 0209-9683 | |
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier | 1093-3263 | |
International Journal on Advanced Science, Engineering and Information Technology | INSIGHT | 2088-5334 | ||
Standards | MDPI | 2305-6703 | ||
International Journal of Security, Privacy and Trust Management | AIRCC | 2319-4103 | ||
International Journal of Health Geographics | 3.000 | Springer | 1476-072X | |
Annals of Operations Research | 4.400 | Springer | 0254-5330 | |
c | Neural Processing Letters | 2.600 | Springer | 1370-4621 |
Computers & Fluids | 2.500 | Elsevier | 0045-7930 | |
b | IEEE Transactions on VLSI Systems | 2.800 | IEEE | 1063-8210 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
Combinatorica | 1.000 | Springer |
Journal of Molecular Graphics and Modelling | 2.700 | Elsevier |
International Journal on Advanced Science, Engineering and Information Technology | INSIGHT | |
Standards | MDPI | |
International Journal of Security, Privacy and Trust Management | AIRCC | |
International Journal of Health Geographics | 3.000 | Springer |
Annals of Operations Research | 4.400 | Springer |
Neural Processing Letters | 2.600 | Springer |
Computers & Fluids | 2.500 | Elsevier |
IEEE Transactions on VLSI Systems | 2.800 | IEEE |
Recomendaciones