会议信息
WISA 2023: World Conference on Information Security Applications
请登录查看会议网址
截稿日期: |
2023-06-16 Extended |
通知日期: |
2023-07-04 |
会议日期: |
2023-08-23 |
会议地点: |
Jeju Island, Korea |
届数: |
24 |
浏览: 16301 关注: 2 参加: 1
征稿
The areas of interest include, but are not limited to:
● AI Security
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Blockchain security
● Critical infrastructure security
● DoS attacks and countermeasures
● Digital Forensics
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Intrusion detection and prevention
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Quantum cryptanalysis
● Security policy
● Side channel attacks and countermeasures
● Storage and file systems security
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments (Intel SGX, ARM Trustzone, etc.)
● Unmanned System Security for Vehicle/Drone/Ship Systems
● Vulnerability research
● Web security
● AI Security
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Blockchain security
● Critical infrastructure security
● DoS attacks and countermeasures
● Digital Forensics
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Intrusion detection and prevention
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Quantum cryptanalysis
● Security policy
● Side channel attacks and countermeasures
● Storage and file systems security
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments (Intel SGX, ARM Trustzone, etc.)
● Unmanned System Security for Vehicle/Drone/Ship Systems
● Vulnerability research
● Web security
最后更新 Dou Sun 在 2023-06-11
相关会议
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information and Organization | 4.7 | Elsevier | 1471-7727 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Computational Optimization and Applications | 2.0 | Springer | 0926-6003 | |
| Journal of Optimization Theory and Applications | 1.5 | Springer | 0022-3239 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| a | Information and Computation | 1.0 | Elsevier | 0890-5401 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |