专栏名称: 轻松参会
回复会议名称获取交流群二维码,如“cvpr”
目录
相关文章推荐
开发者全社区  ·  雪圈乱吗? ·  昨天  
开发者全社区  ·  Top2本硕:一把好牌打的稀烂 ·  2 天前  
开发者全社区  ·  86岁范大师北大携35岁新夫人公开露面 ·  3 天前  
开发者全社区  ·  年入百万的华为夫妇也互撕 ·  3 天前  
51好读  ›  专栏  ›  轻松参会

CCF C类会议ICICS2024即将截稿(附投稿交流群)

轻松参会  · 公众号  ·  · 2024-04-16 15:06

正文

交流群见文末


会议全称:International Conference on Information and Communications Security

录用率:2019年23.62%

CCF分级:网络与信息安全C

截稿时间:2024/4/19

录用通知时间:2024/6/24

官网链接:ICICS 2024

征稿范围:

Topics of Interest include but are not limited to:

• Access control and authorization •Anonymity
• AI-based security and privacy • Applied cryptography
• Threat scenarios, attack models and security analysis • Intrusion detection and prevention
• Attestation • Malware and unwanted software
• Biometrics security and privacy • Misinformation, disinformation, and fake news
• Blockchain and cryptocurrencies • Mobile security and privacy
• Cloud computing and virtualization security • Online safety and child protection
• Cybercrime • Online social media security, privacy, and trust
• Cyber deception and fraud • Operating systems security
• Cyber incident response and recovery • Network security
• Critical infrastructure protection • Privacy enhancing technologies and mechanisms
• Cyber physical systems security • Risk management
• Cyber resilience • Security of communication protocols
• Cyber security education, training, and awareness • Secure information flow
• Cyber threat intelligence • Security management
• Data security and privacy • Security and privacy for the (Industrial) Internet of Things
• Digital forensics • Security and privacy of AI (e.g., adversarial machine learning and federated learning)
• Digital rights management • Security and privacy metrics and policies
• Digital watermarking • Security operations and incident management
• Distributed systems security • Security visualization
• Economics of security and privacy • Secure systems design and architectures
• Edge and fog computing security • Side channel attacks
• Embedded systems security • Software and application security
• Emergency response and recovery • Steganography and steganalysis
• Formal methods for security • Trusted computing
• Hardware security • Trust management and reputation
• Identity management • Usable security and privacy
• Information security management • Vulnerability detection and prevention
• Internet censorship and defense • Web security and privacy







请到「今天看啥」查看全文