会议信息
ISAICS 2026: International Symposium on AI and Cybersecurity
请登录查看会议网址
截稿日期: |
2026-09-18 |
通知日期: |
2026-10-28 |
会议日期: |
2026-11-20 |
会议地点: |
Rizhao, China |
届数: |
3 |
浏览: 9728 关注: 4 参加: 0
征稿
Track 1
Artificial Intelligence
AI and Creativity
Deep Learning
Evolutionary Computing
Fuzzy Systems
Hybrid Intelligent Systems
Industrial Applications of AI
Intelligence and Cybersecurity
Intelligent User Interfaces
Knowledge Representation and Reasoning
Knowledge-Based Systems
Ambient Intelligence
Machine Learning
Model-Based Reasoning
Natural Language Processing
Social Network Analysis
Uncertainty in AI
Vision and Perception
Big Data
Cognitive Systems
Explainable Artificial Intelligence
Track 2
Cybersecurity
Communication Privacy and Anonymity
Distributed denial of service
Web security
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Network segmentation
Application security
Behavioral analytics
Cloud security
Mobile device security
Security information and event management
Wireless security
Artificial Intelligence
AI and Creativity
Deep Learning
Evolutionary Computing
Fuzzy Systems
Hybrid Intelligent Systems
Industrial Applications of AI
Intelligence and Cybersecurity
Intelligent User Interfaces
Knowledge Representation and Reasoning
Knowledge-Based Systems
Ambient Intelligence
Machine Learning
Model-Based Reasoning
Natural Language Processing
Social Network Analysis
Uncertainty in AI
Vision and Perception
Big Data
Cognitive Systems
Explainable Artificial Intelligence
Track 2
Cybersecurity
Communication Privacy and Anonymity
Distributed denial of service
Web security
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Network segmentation
Application security
Behavioral analytics
Cloud security
Mobile device security
Security information and event management
Wireless security
最后更新 Dou Sun 在 2026-02-26
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | b | b1 | SOUPS | International Symposium On Usable Privacy and Security | 2026-02-12 | 2026-05-19 | 2026-08-23 |
| b | a | CSF | IEEE Computer Security Foundations Symposium | 2026-01-29 | 2026-04-01 | 2026-07-26 | |
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| c | b | b1 | ACNS | International Conference on Applied Cryptography and Network Security | 2026-01-23 | 2026-03-19 | 2026-06-22 |
| c | b | b1 | AsiaCCS | ACM ASIA Conference on Computer and Communications Security | 2025-12-12 | 2026-03-10 | 2026-06-01 |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| c | HotSec | USENIX Workshop on Hot Topics in Security | 2020-06-04 | 2020-06-15 | 2020-08-11 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| b | IEEE Transactions on Cybernetics | 10.5 | IEEE | 2168-2267 |
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |