会議情報
ICCNS 2025: International Conference on Communication and Network Security
https://www.iccns.org/提出日: |
2025-11-10 Extended |
通知日: |
2025-11-25 |
会議日: |
2025-12-19 |
場所: |
Jilin, China |
年: |
15 |
閲覧: 25859 追跡: 16 出席: 5
論文募集
The topics of interest include, but not limited to the following:
- Track 1. Communication and Information Engineering
Track Chair: Shaoshuai Gao, University of Chinese Academy of Sciences, China
Track Chair: Yanping Zhang, Gonzaga University, USA
Ad hoc & sensor networks
Embedded networks
High-speed access networks
Home and SOHO networks
IPv6 deployment & migration
Local area networks
Optical networks
Overlay networks
Peer-to-peer networks
Personal and wearable networks
Routing and Scheduling
Storage area networks
Ubiquitous networking
Wireless networks
Multimedia & real-time communication
Network management
Network reliability and security
Network traffic characterization
Cross-layer Design and Optimization
Communication and Information Theory
Communication Software and Services
Protocol and Algorithms for Communications
Wireless Communications and Networking
Broadband Wireless Access
Cooperative Communications and Networking
Optical Communications and Networking
Broadband Networking and Protocols
Internet Services, Systems and Applications
P2P Communications and Networking
Pervasive Computing and Grid Networking
Communication Network Security
- Track 2. Information and network security
Track Chair: Yu-Beng Leau, Universiti Malaysia Sabah, Malaysia
Track Chair: Thuan Yew Edward Chuah, University of Aberdeen, UK
Track Chair: Xuru Li, Shanghai Maritime University, China
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware and botnets
Communication Privacy and Anonymity
Distributed denial of service
Public Key Infrastructures, key management, credentials
Web security
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
computer virus
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Email security
Anti-virus and anti-malware software
Network segmentation
Application security
Behavioral analytics
Cloud security
Intrusion prevention systems
Mobile device security
Security information and event management
Wireless security
Track 3. Data security - 数据安全
Cryptography and Encryption Techniques: Advances in cryptographic algorithms and their applications in securing data.
Data Integrity and Authenticity: Techniques for ensuring data is accurate and has not been altered maliciously.
Cloud Security: Strategies for securing data stored in cloud environments, including access controls and encryption methods.
Network Security Protocols: Examination of protocols that enhance data security during transmission.
Machine Learning for Threat Detection: Utilizing AI and ML to identify and respond to potential security breaches in real-time.
Application Security: Best practices for securing mobile and web applications against data breaches.
Incident Response and Management: Approaches for rapid response to data security breaches and restoration of services.
Security in IoT Devices: Challenges and solutions in securing data transmitted from Internet of Things devices.
Data Backup and Recovery Solutions: Techniques for ensuring data availability and integrity in case of a breach.
Regulatory Compliance: Understanding GDPR, HIPAA, and other regulations affecting data protection and security measures.
Track 4. Privacy Protection - 隐私保护
Track Chair: Lijun Zhang, E-surfing Vision Technology Co., Ltd, China Telecom, China
Data Anonymization Techniques: Methods to remove personal identifiers from datasets while maintaining data utility.
User Consent and Data Collection: Implications of user consent management regarding data collection practices.
Privacy by Design: Incorporating privacy measures into the development process of systems and services.
Surveillance and Data Privacy: The impact of government and corporate surveillance on personal privacy.
Privacy Enhancing Technologies (PETs): Tools and methodologies for enhancing individual privacy online.
Blockchain for Privacy Protection: Exploring how blockchain can be used to enhance data privacy.
Ethical Considerations in Data Handling: The role of ethics in data collection, processing, and sharing practices.
Cross-Border Data Transfers: Legal and technical challenges related to transferring data across international borders.
Consumer Privacy Rights: An analysis of consumer rights regarding their personal data under various regulations.
Impact of AI on Privacy: The implications of artificial intelligence on personal privacy and data handling.
最終更新 Dunn Carl 2025-10-23
関連会議
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| Cognitive Processing | 1.700 | Springer | 1612-4782 | |
| Journal of Intelligent & Fuzzy Systems | 1.700 | IOS Press | 1064-1246 | |
| Mathematical and Computer Modelling of Dynamical Systems | 1.800 | Taylor & Francis | 1387-3954 | |
| Standards | MDPI | 2305-6703 | ||
| International Journal of Security, Privacy and Trust Management | AIRCC | 2319-4103 | ||
| Brain Informatics | Springer | 2198-4018 | ||
| AI & SOCIETY | 2.900 | Springer | 0951-5666 | |
| c | Neural Processing Letters | 2.600 | Springer | 1370-4621 |
| Computers & Fluids | 2.500 | Elsevier | 0045-7930 | |
| VLSI Design | Hindawi | 1065-514X |
| 完全な名前 | インパクト ・ ファクター | 出版社 |
|---|---|---|
| Cognitive Processing | 1.700 | Springer |
| Journal of Intelligent & Fuzzy Systems | 1.700 | IOS Press |
| Mathematical and Computer Modelling of Dynamical Systems | 1.800 | Taylor & Francis |
| Standards | MDPI | |
| International Journal of Security, Privacy and Trust Management | AIRCC | |
| Brain Informatics | Springer | |
| AI & SOCIETY | 2.900 | Springer |
| Neural Processing Letters | 2.600 | Springer |
| Computers & Fluids | 2.500 | Elsevier |
| VLSI Design | Hindawi |