-- 作者:aca_conference
-- 发布时间:5/28/2025 8:48:00 AM
-- 第八届网络安全前沿国际会议(FCS 2025)[原创]
第八届网络安全前沿国际会议(FCS 2025) 贵阳 2025年10月24-26日 会议网址: https://icfcs.org 会议简介: The Eighth International Conference on Frontiers in Cyber Security (FCS 2025) will be co-organized by School of Big Data and Computer Science, Guizhou Normal University and School of Mathematics, Southwest Minzu University. It will be held in Guiyang, P.R. China, from October 24 to October 26, 2025. Cyber security is being paid more and more attention by industry and academia. New cyber security technologies are emerging. Many universities and institutions have set up research centers or schools for cyber security. Both government and enterprises strongly support teaching and research in cyber security. However, how to conduct research and education on cyber security is inexperienced and how to run a center for cyber security is also worth exploring since it involves many departments. The FCS conference provides a good platform for researchers and practitioners to exchange the latest research results in cyber security. The conference proceedings will be published by Springer Communications in Computer and Information Science (CCIS), which is indexed by EI. 组织单位: 贵州师范大学大数据与计算机学院 西南民族大学数学学院 会议投稿: 征稿主题: Access control Key management and key recovery Anonymity Language-based security Applied cryptography Malware and anti-malware Authentication and authorization Mobile computing security and privacy Biometrics security Network security Blockchain security and privacy Cloud computing and edge computing security Operating systems security Computer and digital forensics Cyber-physical systems security Privacy protection Data and system integrity Privacy-preserving data mining Database security Wireless security Multimedia security Distributed systems security Social networks security, privacy and trust Software defined networking security Embedded systems security Security management Security models, metrics, and policies Fraud and cyber-crime Security and privacy of Big Data Hardware security Security of critical Infrastructures Identity access management Trust and reputation systems Trusted and trustworthy computing technologies Usable security and privacy Insider threat detection Underground economy Intellectual property protection Verification of security protocols Intrusion detection Web security IoT security and privacy AI security Others 联系方式: 会议官网:https://icfcs.org 联系电话:+86 19136140052 会议邮箱:fcs@youngac.cn
|