69一区二三区好的精华液,中文字幕无码av波多野吉衣,亚洲精品久久久久久无码色欲四季,日本不卡高字幕在线2019

擔任DSC2016PC member,歡迎大家投稿。
來源: 劉憶寧/
無業(yè)
2848
8
0
2018-04-03

http://dsc2018.nsysu.edu.tw/

The 2018 IEEE Conference on Dependable and Secure Computing

Kaohsiung ? Taiwan | December 10—13, 2018


Regular Track: Computer Systems, Networks and Software/Hardware

  • Advanced Persistent Threat (APT)

  • Network Attack and Defense Techniques

  • Botnet and Intrusion Detection

  • Cryptographic Methods and Toolkits

  • Cyber attacks

  • Software Vulnerabilities and Security

  • Database Security and Privacy

  • Embedded Systems and IoT Devices

  • Mobile and Cloud Computing security

  • AI and Big Data Analysis for security

  • Malware Mutation

  • Deep Learning for Attack and Defense

  • Block Chain and Finance Security

  • Security Hardware and Circuits

  • Authentication and Authorization

  • Soft-Error Analysis and Models

  • CAD Algorithms and Tools

  • Electronic Circuits and Systems

  • Fault-Tolerance and Reliability

  • Industrial Design Experiences

  • Noise- and Power-Aware Designs

  • Stochastic Circuits and Systems

  • Temperature-Aware Designs

  • Variable-Latency Designs

 

Experience and Practice

The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

  • Attacks on Information Systems and Digital Storage

  • CSIRTs, Incident Analysis and Response

  • Hacking Techniques and Countermeasures

  • Honeypots/Honeynets

  • Malware Analysis and Reversing

  • Mobile Communications Security and Vulnerabilities

  • Newly discovered vulnerabilities

  • Offensive Information Technology

  • Reverse Engineering, Forensics, and Anti-Forensics

  • Spyware, Phishing and Distributed Attacks

  • VLSI/CAD Design Knowhow


登錄用戶可以查看和發(fā)表評論, 請前往  登錄 或  注冊
SCHOLAT.com 學(xué)者網(wǎng)
免責聲明 | 關(guān)于我們 | 聯(lián)系我們
聯(lián)系我們: 讀取中...hnNijkJXGJ@NDRne.com LkZMyrcXu@tdc.com SMDNEJY@OfGMzE.com hqzhLDb@pflu.com fLgeeMjJU@JpidN.com fcolTVxFO@ErMKTkv.com Uktju@EeX.com yPEkqnvkWm@eyQLVp.com WRzOBoH@WCniwF.com HDBPwNBEFy@StH.com
主站蜘蛛池模板: 库伦旗| 四会市| 南岸区| 巴楚县| 富阳市| 育儿| 屏山县| 望城县| 丽水市| 新蔡县| 正阳县| 平阳县| 永昌县| 穆棱市| 新疆| 平果县| 特克斯县| 康平县| 嵩明县| 神木县| 广西| 镇宁| 莫力| 日照市| 新野县| 湖北省| 阳山县| 鹤壁市| 三台县| 北海市| 丰都县| 临桂县| 通榆县| 翁牛特旗| 将乐县| 揭西县| 革吉县| 安义县| 昆明市| 仪陇县| 泽普县|