![]() |
| |||||||||||||||
NISecurity 2021 : 2021 International Conference on Network and Information Security (NISecurity 2021) | |||||||||||||||
Link: http://www.nisecurity.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
★2021 International Conference on Network and Information Security (NISecurity 2021)-- Ei Compendex & Scopus—Call for paper
August 13-15, 2021|Stockholm, Sweden|Website: www.nisecurity.org ★NISecurity 2021 provides researchers and industry experts with one of the best platforms to meet and discuss groundbreaking research and innovations in the field of Network and Information Security. International invited speakers are invited to present their state-of-the-art work on various aspects, which will highlight important and developing areas. ★Publication and Indexing The accepted and registered papers will be sent to be published in the digital conference proceeding, which will be sent to be indexed by major citation databases such as Ei Compendex, SCOPUS, CPCI, Google Scholar, Cambridge Scientific Abstracts (CSA), Inspec, SCImago Journal & Country Rank (SJR), EBSCO, CrossRef, Thomson Reuters (WoS), etc. A selection of good papers can be recommended to journal for publication after significant extension. ★Keynote Speakers Dr. Ramjee Prasad, International Cooperation Advisor, California, USA Prof.Amir Herzberg, University of Connecticut, USA Prof.Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain ★Program Preview/ Program at a glance August 13: Registration + Icebreaker Reception August 14: Opening Ceremony+ KN Speech+ Technical Sessions August 15: Technical Sessions+ Half day tour/Lab tours ★Paper Submission 1.Submit Via CMT: https://cmt3.research.microsoft.com/NIS2021 2.Submit Via email directly to: nisecurity@iaeeee.org ★CONTACT US Ms. Chris Y. Cheung Email: nisecurity@iaeeee.org Website: www.nisecurity.org Call for papers(http://www.nisecurity.org/cfp): Access Control and Intrusion Detection Privacy and Authentication Artificial Immune Systems Quantum Cryptography Authentication Regulation and Trust Mechanisms Authentication and Non-repudiation Reinforcement & Unsupervised Learning Autonomy-Oriented Computing Secure Cloud Computing Biological & Evolutionary Computation Security & Network Management Biometric Security Security and Privacy in Mobile Systems Coevolutionary Algorithms Security and Privacy in Pervasive and Ubiquitous Computing Computational Intelligence in Security Security and Privacy in Web Sevices Cryptographic protocols Security and Privacy Policies Cryptographic Protocols Security Area Control Cryptography and Coding Security Deployment Data Integrity Security Engineering Database and System Security Security for Grid Computing DDoS, MiM, Session Hijacking, Replay attack Security in Distributed Systems E-mail security, Spam, Phishing, E-mail fraud Security Information Systems Architecture and Design and Security Patterns Fuzzy Systems Security Management Identification and Authentication Security Requirements Insider Threats and Countermeasures Security threats & countermeasures Intelligent Agents and Systems Sensor and Mobile Ad Hoc Network Security Internet Security & Applications Service and Systems Design and QoS Network Security Intrusion Detection & Prevention Software Security Intrusion Detection and Prevention Threats, Vulnerabilities, Risk, Formal Methods Intrusion Detection and Vulnerability Assessment Trust Management Key Management Trust Models and Metrics Mobile, Ad Hoc and Sensor Network Security Ubiquitous Computing Security Models for Authentication, Trust and Authorization Untraceability Network and Wireless Network Security Virus, worms, Trojan Protection Peer-to-Peer Network Security Web 2.0 security Performance Evaluations of Protocols & Security Application |
|