Información de la conferencia
ICCNS 2025: International Conference on Communication and Network Security
https://www.iccns.org/
Día de Entrega:
2025-08-01
Fecha de Notificación:
2025-09-01
Fecha de Conferencia:
2025-12-19
Ubicación:
Jilin, China
Años:
15
Vistas: 23997   Seguidores: 16   Asistentes: 3

Solicitud de Artículos
The topics of interest include, but not limited to the following:

    - Track 1. Communication and Information Engineering
    Track Chair: Shaoshuai Gao, University of Chinese Academy of Sciences, China
    Track Chair: Yanping Zhang, Gonzaga University, USA
    Ad hoc & sensor networks
    Embedded networks
    High-speed access networks
    Home and SOHO networks
    IPv6 deployment & migration
    Local area networks
    Optical networks
    Overlay networks
    Peer-to-peer networks
    Personal and wearable networks
    Routing and Scheduling
    Storage area networks
    Ubiquitous networking
    Wireless networks
    Multimedia & real-time communication
    Network management
    Network reliability and security
    Network traffic characterization
    Cross-layer Design and Optimization
    Communication and Information Theory
    Communication Software and Services
    Protocol and Algorithms for Communications
    Wireless Communications and Networking
    Broadband Wireless Access
    Cooperative Communications and Networking
    Optical Communications and Networking
    Broadband Networking and Protocols
    Internet Services, Systems and Applications
    P2P Communications and Networking
    Pervasive Computing and Grid Networking
    Communication Network Security

- Track 2. Information and network security
Track Chair: Yu-Beng Leau, Universiti Malaysia Sabah, Malaysia
Track Chair: Thuan Yew Edward Chuah, University of Aberdeen, UK
Track Chair: Xuru Li, Shanghai Maritime University, China
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware and botnets
Communication Privacy and Anonymity
Distributed denial of service
Public Key Infrastructures, key management, credentials
Web security
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
computer virus
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Email security
Anti-virus and anti-malware software
Network segmentation
Application security
Behavioral analytics
Cloud security
Intrusion prevention systems
Mobile device security
Security information and event management
Wireless security

Track 3. Data security - 数据安全
Cryptography and Encryption Techniques: Advances in cryptographic algorithms and their applications in securing data.
Data Integrity and Authenticity: Techniques for ensuring data is accurate and has not been altered maliciously.
Cloud Security: Strategies for securing data stored in cloud environments, including access controls and encryption methods.
Network Security Protocols: Examination of protocols that enhance data security during transmission.
Machine Learning for Threat Detection: Utilizing AI and ML to identify and respond to potential security breaches in real-time.
Application Security: Best practices for securing mobile and web applications against data breaches.
Incident Response and Management: Approaches for rapid response to data security breaches and restoration of services.
Security in IoT Devices: Challenges and solutions in securing data transmitted from Internet of Things devices.
Data Backup and Recovery Solutions: Techniques for ensuring data availability and integrity in case of a breach.
Regulatory Compliance: Understanding GDPR, HIPAA, and other regulations affecting data protection and security measures.
 
Track 4. Privacy Protection - 隐私保护
Track Chair: Lijun Zhang, E-surfing Vision Technology Co., Ltd, China Telecom, China
Data Anonymization Techniques: Methods to remove personal identifiers from datasets while maintaining data utility.
User Consent and Data Collection: Implications of user consent management regarding data collection practices.
Privacy by Design: Incorporating privacy measures into the development process of systems and services.
Surveillance and Data Privacy: The impact of government and corporate surveillance on personal privacy.
Privacy Enhancing Technologies (PETs): Tools and methodologies for enhancing individual privacy online.
Blockchain for Privacy Protection: Exploring how blockchain can be used to enhance data privacy.
Ethical Considerations in Data Handling: The role of ethics in data collection, processing, and sharing practices.
Cross-Border Data Transfers: Legal and technical challenges related to transferring data across international borders.
Consumer Privacy Rights: An analysis of consumer rights regarding their personal data under various regulations.
Impact of AI on Privacy: The implications of artificial intelligence on personal privacy and data handling.
Última Actualización Por Dou Sun en 2025-08-02
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
cb4LATINCOMIEEE Latin-American Conference on Communications2024-08-052024-09-062024-11-06
cWASAInternational Conference on Wireless Algorithms, Systems, and Applications2025-02-152025-03-152025-06-24
ICCABSIEEE International Conference on Computational Advances in Bio and Medical Sciences2016-08-012016-09-012016-10-13
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
bb2MMSPInternational Workshop on Multimedia Signal Processing2024-06-192024-07-172024-10-02
DCITInternational Symposium on Dependable Computing and Internet of Things2015-07-152015-08-152015-11-16
FCTAInternational Conference on Fuzzy Computation Theory and Applications2024-06-032024-07-312024-11-20
SGGEAAsia Conference on Smart Grid, Green Energy and Applications2025-11-102025-11-302025-12-12
ICIFSInternational Conference on Intuitionistic Fuzzy Sets2019-02-212019-03-112019-05-16
ExpressiveJoint Symposia on Sketch-Based Interfaces and Modeling, Non-Photorealistic Animation and Computational Aesthetics 2015-03-282015-04-262015-06-20
Revistas Relacionadas
Recomendaciones