Scopes
(Topics include but are not limited to)
Linear Algebra
Matrix theory
Vector analysis
Complex analysis
ordinary differential equation
numerical analysis
probability theory
mathematical statistics
Operations Research
Game theory
control theory
Combinatorial mathematics
Data analysis
statistics
geometry
Parameter calculation
mathematical modeling
nonlinear analysis
Algebraic topology
catastrophe theory
functional analysis
differential geometry
Set theory
mathematical logic
Algebraic number theory
Analytical Number Theory
Function theory
discrete mathematics
Symmetry and integrable systems
Complex function
Real variable function
Special functions and orthogonal polynomials
The Application of Computer Mathematics
The Mathematical Theory of Artificial Intelligence
applied mathematics
algorithm analysis
approximation algorithm
Computability theory
evolutionary algorithms
genetic algorithm
numerical analysis
Online algorithms
Quantum Algorithm
Randomization algorithm
Sorting algorithm
Algorithm Graph Theory and Combination
Computational geometry
Active Defense System
Adaptive Defense System
Security system analysis, benchmarking
Applied cryptography
Authentication method
Biometric security
Complex system security
Database and System Security
data protection
Data/System Integrity
Distributed Access Control
Distributed attack system
Denial of service
High performance network virtualization
High performance security system
Security in Cloud and Grid Systems
Security in E-commerce
Security in ubiquitous/ubiquitous computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agent and Mobile
Dynamic code
Security simulation and tools
Trusted computing
Linear Algebra
Matrix theory
Vector analysis
Complex analysis
ordinary differential equation
numerical analysis
probability theory
mathematical statistics
Operations Research
Game theory
control theory
Combinatorial mathematics
Data analysis
statistics
geometry
Parameter calculation
mathematical modeling
nonlinear analysis
Algebraic topology
catastrophe theory
functional analysis
differential geometry
Set theory
mathematical logic
Algebraic number theory
Analytical Number Theory
Function theory
discrete mathematics
Symmetry and integrable systems
Complex function
Real variable function
Special functions and orthogonal polynomials
The Application of Computer Mathematics
The Mathematical Theory of Artificial Intelligence
applied mathematics
algorithm analysis
approximation algorithm
Computability theory
evolutionary algorithms
genetic algorithm
numerical analysis
Online algorithms
Quantum Algorithm
Randomization algorithm
Sorting algorithm
Algorithm Graph Theory and Combination
Computational geometry
Active Defense System
Adaptive Defense System
Security system analysis, benchmarking
Applied cryptography
Authentication method
Biometric security
Complex system security
Database and System Security
data protection
Data/System Integrity
Distributed Access Control
Distributed attack system
Denial of service
High performance network virtualization
High performance security system
Security in Cloud and Grid Systems
Security in E-commerce
Security in ubiquitous/ubiquitous computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agent and Mobile
Dynamic code
Security simulation and tools
Trusted computing
Important Dates | 重要日期
- Submission Deadline: 2024.12.9
- Registration Deadline: 2024.12.14
- Conference Date: 2024.12.29
- Notification Date: About a week after the submission
Submission Portal | 投稿方式
Mail Address: icsdcc_Info@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
冯老师
- 17780683172
- 2533895639
--
- --
- --
Indexing Service | 索引服务
Follow Us | 联系我们
冯老师
--