69一区二三区好的精华液,中文字幕无码av波多野吉衣,亚洲精品久久久久久无码色欲四季,日本不卡高字幕在线2019

擔任DSC2016PC member,歡迎大家投稿。
來源: 劉憶寧/
無業
2846
8
0
2018-04-03

http://dsc2018.nsysu.edu.tw/

The 2018 IEEE Conference on Dependable and Secure Computing

Kaohsiung ? Taiwan | December 10—13, 2018


Regular Track: Computer Systems, Networks and Software/Hardware

  • Advanced Persistent Threat (APT)

  • Network Attack and Defense Techniques

  • Botnet and Intrusion Detection

  • Cryptographic Methods and Toolkits

  • Cyber attacks

  • Software Vulnerabilities and Security

  • Database Security and Privacy

  • Embedded Systems and IoT Devices

  • Mobile and Cloud Computing security

  • AI and Big Data Analysis for security

  • Malware Mutation

  • Deep Learning for Attack and Defense

  • Block Chain and Finance Security

  • Security Hardware and Circuits

  • Authentication and Authorization

  • Soft-Error Analysis and Models

  • CAD Algorithms and Tools

  • Electronic Circuits and Systems

  • Fault-Tolerance and Reliability

  • Industrial Design Experiences

  • Noise- and Power-Aware Designs

  • Stochastic Circuits and Systems

  • Temperature-Aware Designs

  • Variable-Latency Designs

 

Experience and Practice

The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

  • Attacks on Information Systems and Digital Storage

  • CSIRTs, Incident Analysis and Response

  • Hacking Techniques and Countermeasures

  • Honeypots/Honeynets

  • Malware Analysis and Reversing

  • Mobile Communications Security and Vulnerabilities

  • Newly discovered vulnerabilities

  • Offensive Information Technology

  • Reverse Engineering, Forensics, and Anti-Forensics

  • Spyware, Phishing and Distributed Attacks

  • VLSI/CAD Design Knowhow


登錄用戶可以查看和發表評論, 請前往  登錄 或  注冊。
SCHOLAT.com 學者網
免責聲明 | 關于我們 | 聯系我們
聯系我們:
主站蜘蛛池模板: 锡林浩特市| 延庆县| 通道| 交口县| 桓台县| 富锦市| 高雄市| 丹江口市| 沙坪坝区| 新昌县| 拉萨市| 扎兰屯市| 博白县| 常熟市| 康保县| 乌拉特前旗| 德兴市| 营口市| 西城区| 玉树县| 赤壁市| 濮阳市| 曲沃县| 白水县| 肃南| 阳东县| 永靖县| 福清市| 洛阳市| 古丈县| 林西县| 霍城县| 海宁市| 关岭| 枣庄市| 巴塘县| 文登市| 陇川县| 青川县| 清徐县| 和龙市|