IETP-Conference on Open Access
  • today : 38
  • month : 8683
  • total : 672262


Conference Title (ISNS 2020) Int'l Conference on Information Security and Network Security
Conference Dates Jul 17-19 , 2020
Submission Deadline 2020-02-09
Official Web Site
Venue Kunming Jin Jiang Hotel
Location Kunming , China
Description Int'l Conference on Information Security and Network Security (ISNS 2020)

Conference Date: July 17-19, 2020
Conference Venue: Kunming, China
Online Registration System:
Int'l Conference on Information Security and Network Security (ISNS 2020) will be held from July 17-19, 2020 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields.

If you wish to serve the conference as an invited speaker, please send email to us with your CV. We'll contact with you asap.

Publication and Presentation

Publication: Open Access Journal,please contact us for detailed information
Index: CNKI and Google Scholar
Note: If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract to our Registration System.

Contact Us

Tel: +86 132 6470 2250
QQ: 1349406763, 3025797047
WeChat: 3025797047
Attendance Methods

1.Submit full paper (Regular Attendance+Paper Publication+Presentation)
You are welcome to submit full paper, all the accepted papers will be published by Open access journal.
2. Submit abstract (Regular Attendance+Abstract+Presentation)
3. Regular Attendance (No Submission Required)

Conference Topics

Access Control
Anti-Virus and Anti-Worms
Authentication and Authorization
Active Defense Systems
Adaptive Defense Systems
Analysis, Benchmark of Security Systems
Biometric Security
Complex Systems Security
Data and System Integrity
Database Security
Distributed Systems Security
Data Protection
Electronic Commerce Security
Fraud Control
Grid Security
High Performance Network Virtualization
High Performance Security Systems
Hardware Security
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Intellectual Property Protection
Intrusion Detection
Internet and Network Forensics
Intrusion Detection and Prevention
Key Management and Key Recovery
Language-based Security
Large-scale Attacks and Defense
Network Security
Risk Evaluation and Security Certification
Security and Privacy for Social Computing
Security Evaluation
Security for Mobile Computing
Security Models
Security Protocols
Signature and Key Agreement Protocol
Software Security
System Security
Security in Cloud and Grid Systems
Security in E-Commerce
Security in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agents and Mobile Code
Security Policy
Security Protocols
Security Simulation and Tools
Security Theory and Tools
Standards and Assurance Methods
Trusted Computing and Trustworthy Computing Technology

  • 페이스북으로 보내기
  • 트위터로 보내기
  • linkedin로 보내기