Scopes
(The following topics include but are not limited to)
Topic 1: Cryptography
cryptographic protocol
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
authentication
Trust and Authorization Model
Wireless Network Security
Information hiding, data and system integrity
Topic 2: Cybersecurity
Key Management
Network Partitioning
application security
Behavioral Analysis
Cloud Security
Intrusion Prevention System
Mobile device security
Security Information and Event Management
wireless security
Credentials, network security
routing
Naming/Addressing
network management
Malicious software and botnets
Communication privacy and anonymity
distributed denial of service
Public key infrastructure
information leakage
Data tampering
Data Delete
computer virus
Security vulnerabilities
Attack monitoring
encrypted communication
Information dissemination security
Network Isolation
application security
Email Security
Anti virus and anti malware software
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies: VoIP、 Point to point and overlay network systems
Topic 3: Information Systems
Data visualization
Data driven decision-making
information resources management
Cloud computing and its applications
Innovation in Information Management Technology
Big Data Management and Analysis
Development and Implementation of Information Systems
Information Security and Privacy Protection
Knowledge Management and Data Mining
enterprise information system architecture
Information System Performance Evaluation
Internet of Things Information Management
Information Management Ethics and Regulations
Application of Artificial Intelligence in Information Management
User Experience Design of Information Systems
Risk Management of Information Management Projects
other related topics
Topic 1: Cryptography
cryptographic protocol
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
authentication
Trust and Authorization Model
Wireless Network Security
Information hiding, data and system integrity
Topic 2: Cybersecurity
Key Management
Network Partitioning
application security
Behavioral Analysis
Cloud Security
Intrusion Prevention System
Mobile device security
Security Information and Event Management
wireless security
Credentials, network security
routing
Naming/Addressing
network management
Malicious software and botnets
Communication privacy and anonymity
distributed denial of service
Public key infrastructure
information leakage
Data tampering
Data Delete
computer virus
Security vulnerabilities
Attack monitoring
encrypted communication
Information dissemination security
Network Isolation
application security
Email Security
Anti virus and anti malware software
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies: VoIP、 Point to point and overlay network systems
Topic 3: Information Systems
Data visualization
Data driven decision-making
information resources management
Cloud computing and its applications
Innovation in Information Management Technology
Big Data Management and Analysis
Development and Implementation of Information Systems
Information Security and Privacy Protection
Knowledge Management and Data Mining
enterprise information system architecture
Information System Performance Evaluation
Internet of Things Information Management
Information Management Ethics and Regulations
Application of Artificial Intelligence in Information Management
User Experience Design of Information Systems
Risk Management of Information Management Projects
other related topics
Important Dates/重要日期
- Submission Deadline: April 2, 2025
- Registration Deadline: April 7, 2025
- Conference Date: April 17, 2025
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: eiference_paper@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
江老师
+86-17162867270(微信同号)
3896770362
--
+86---(微信同号)
--