Conference Information
ICCNS 2024: International Conference on Communication and Network Security
https://www.iccns.org/
Submission Date:
2024-10-15 Extended
Notification Date:
2024-10-30
Conference Date:
2024-12-06
Location:
Xiamen, China
Years:
14
Viewed: 22090   Tracked: 16   Attend: 3

Call For Papers
The topics of interest include, but not limited to the following:

    - Communication and Information Engineering
    Ad hoc & sensor networks
    Embedded networks
    High-speed access networks
    Home and SOHO networks
    IPv6 deployment & migration
    Local area networks
    Optical networks
    Overlay networks
    Peer-to-peer networks
    Personal and wearable networks
    Routing and Scheduling
    Storage area networks
    Ubiquitous networking
    Wireless networks
    Multimedia & real-time communication
    Network management
    Network reliability and security
    Network traffic characterization
    Cross-layer Design and Optimization
    Communication and Information Theory
    Communication Software and Services
    Protocol and Algorithms for Communications
    Wireless Communications and Networking
    Broadband Wireless Access
    Cooperative Communications and Networking
    Optical Communications and Networking
    Broadband Networking and Protocols
    Internet Services, Systems and Applications
    P2P Communications and Networking
    Pervasive Computing and Grid Networking
    Communication Network Security

- Information and network security
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware and botnets
Communication Privacy and Anonymity
Distributed denial of service
Public Key Infrastructures, key management, credentials
Web security
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
computer virus
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Email security
Anti-virus and anti-malware software
Network segmentation
Application security
Behavioral analytics
Cloud security
Intrusion prevention systems
Mobile device security
Security information and event management
Wireless security
Last updated by Dunn Carl in 2024-11-01
Related Conferences
Recommendation