Science topic
Information Systems Security - Science topic
Explore the latest questions and answers in Information Systems Security, and find Information Systems Security experts.
Questions related to Information Systems Security
会议征稿:2024年计算机与信息安全国际会议 (WCCIS 2024)
Call for papers: Organized by Universiti Malaya, 2024 World Conference of Computer and Information Security(WCCIS 2024) will be held on 20-22 September 2024 in Malaysia.
Conference website(English):https://ais.cn/u/JnMNfa
重要信息
大会官网(投稿网址):https://ais.cn/u/JnMNfa
大会时间:2024年9月20-22日
大会地点:吉隆坡,马来西亚 | 中国郑州 双会场
收录类型:EI Compendex、Scopus
主办单位:马来亚大学、郑州大学公共安全研究院
会议详情
由马来亚大学主办,2024年计算机与信息安全国际会议 (WCCIS 2024) 将于2024年9月20-22日召开。会议将设置中国/马来西亚双会场。中国会场将在郑州举行;马来西亚会场将在吉隆坡召开。会议旨在为从事计算机与信息安全的专家学者、工程技术人员、技术研发人员提供一个共享科研成果和前沿技术,了解学术发展趋势,拓宽研究思路,加强学术研究和探讨,促进学术成果产业化合作的平台。
会议征稿主题(包括但不限于)
网络
访问控制
信息系统安全与管理
社交网络安全、隐私和信任
计算机网络与通信
信号和图像处理
信息安全算法与协议
嵌入式系统安全
通信工程
卫星通信
云与边缘计算安全
区块链安全与隐私
身份访问管理
网络物理系统安全
知识产权保护
智能信息处理技术
数据挖掘
数据可视化
图像处理
语音识别
信息技术在企业的应用
信号处理
智能通信与计算
数学与信息网络
数字媒体信息处理
卫星通信
无线通信
系统模型设计与信息管理
生物识别技术
嵌入式系统和软件
物联网信息安全
社交网络
物联网信息分析处理
......
出版信息
本会议投稿经过2-3位组委会专家严格审核之后,最终所录用的论文将由全球知名的科技出版社380220803174252410.png斯普林格旗下的Springer-LNICST(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), ISSN: 1867-822X 出版,出版后提交至EI Compendex,Scopus检索。
参会报名
1、投稿作者参会:投稿全文经审稿后文章被录用且完成注册,每篇文章由一名作者代表参会,在会议现场进行口头报告或海报展示。
2、报告者参会(无投稿):在会议上进行口头报告展示,口头报告摘要不提交出版。
3、海报参会(无投稿):在会议上进行论文海报展示,A1尺寸,彩色打印(具体要求咨询会议负责老师)。
4、听众参会(无投稿):出席并参加这次会议, 并可全程旁听会议所有展示与报告。
*参会报名方式:https://ais.cn/u/JnMNfa

Please provide information which area will be good for doing Ph.D research in cyber security. Thanks
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
Teresa,
I am very interested in your research. Can you tell me what aspect(s) of cyber security your research is addressing? Some that come to mind are: log monitoring, malware analysis and mitigation, incident, threat and mitigation sharing, attribution, heuristic based analysis, identifying anomalous behavior in people and software...
Sincerely,
Sandy Vaughan
Security risks that occur when storing petabytes of data into one cluster and how Hadoop ecosystem handles the threats from attackers.
Suggest some algorithms/reference links
Hey all
I am providing the scope of ISMS for an organization who has contract with us. We are going to test the feasibility before implementing ISMS. Does anyone have any idea about such an issue?
Thank you so much.
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
Until now, I reviewed many papers which talked about the security of chaos based ciphers, but until now I could not find the commercial use for chaotic based ciphers. Maybe it is currently still being researched?
I need some recent A grade journal papers to start work in this field, please give me a reliable suggestion.