• “中国历史学十大学术热点”在澳门发布-澳门-时政频道-中工网 2018-03-27
  • 神舞幻想全剧情图文攻略 全章节地图详解(下) 2018-03-27
  • 宗赞护法神和工堂女神相会的故事 2018-03-27
  • 桐乡经济开发区做优营商环境 2018-03-27
  • MVP竞赛榜:哈登实现八连庄 勇士无人进前五 2018-03-27
  • 如果你是个拍立得迷 不能错过这款RF70旁轴相机如果你是个拍立得迷不能错过这款RF70旁轴相机-导购资讯 2018-03-27
  • “六个核桃”:加强设计创新 杜绝商品装潢抄袭 2018-03-27
  • 《半月谈》2018年第2期目录 2018-03-27
  • 《盗诀之赤血蟾王》评书 全集,播音:马长辉,盗诀之赤血蟾王全集 2018-03-27
  • 锂电池机上着火的特殊处置 2018-03-27
  • 栗战书会见喀麦隆总统比亚 2018-03-27
  • 劳动力市场治理灵活稳定性的新内涵-深度报道-工会新闻频道-中工网 2018-03-27
  • 治理养殖污染建议纳入政府工作思路 2018-03-27
  • 杭商大学金融学院今日开班 计划3年辅导50家企业上市 2018-03-27
  • 火箭喜迎四连胜 马刺列西部第七 2018-03-27
  • 担任DSC2016PC member,欢迎大家投稿。
    来源: 刘忆宁/
    桂林电子科技大学计算机与信息安全学院
    468
    8
    0
    2018-04-03

    http://dsc2018.nsysu.edu.tw/

    The 2018 IEEE Conference on Dependable and Secure Computing

    腾讯分分彩-走势图 www.h40zw.cn Kaohsiung ? Taiwan | December 10—13, 2018


    Regular Track: Computer Systems, Networks and Software/Hardware

    • Advanced Persistent Threat (APT)

    • Network Attack and Defense Techniques

    • Botnet and Intrusion Detection

    • Cryptographic Methods and Toolkits

    • Cyber attacks

    • Software Vulnerabilities and Security

    • Database Security and Privacy

    • Embedded Systems and IoT Devices

    • Mobile and Cloud Computing security

    • AI and Big Data Analysis for security

    • Malware Mutation

    • Deep Learning for Attack and Defense

    • Block Chain and Finance Security

    • Security Hardware and Circuits

    • Authentication and Authorization

    • Soft-Error Analysis and Models

    • CAD Algorithms and Tools

    • Electronic Circuits and Systems

    • Fault-Tolerance and Reliability

    • Industrial Design Experiences

    • Noise- and Power-Aware Designs

    • Stochastic Circuits and Systems

    • Temperature-Aware Designs

    • Variable-Latency Designs

     

    Experience and Practice

    The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

    • Attacks on Information Systems and Digital Storage

    • CSIRTs, Incident Analysis and Response

    • Hacking Techniques and Countermeasures

    • Honeypots/Honeynets

    • Malware Analysis and Reversing

    • Mobile Communications Security and Vulnerabilities

    • Newly discovered vulnerabilities

    • Offensive Information Technology

    • Reverse Engineering, Forensics, and Anti-Forensics

    • Spyware, Phishing and Distributed Attacks

    • VLSI/CAD Design Knowhow


    登录用户可以查看和发表评论, 请前往  登录 或  注册。
    Copyright 2009-2018. All Rights Reserved. SCHOLAT 学者网 版权所有 粤ICP备16019897号-1
    免责声明 | 关于我们 | 腾讯分分彩-走势图
    联系我们: