- Communication and Information Engineering
Ad hoc & sensor networks
Embedded networks
High-speed access networks
Home and SOHO networks
IPv6 deployment & migration
Local area networks
Optical networks
Overlay networks
Peer-to-peer networks
Personal and wearable networks
Routing and Scheduling
Storage area networks
Ubiquitous networking
Wireless networks
Multimedia & real-time communication
Network management
Network reliability and security
Network traffic characterization
Cross-layer Design and Optimization
Communication and Information Theory
Communication Software and Services
Protocol and Algorithms for Communications
Wireless Communications and Networking
Broadband Wireless Access
Cooperative Communications and Networking
Optical Communications and Networking
Broadband Networking and Protocols
Internet Services, Systems and Applications
P2P Communications and Networking
Pervasive Computing and Grid Networking
Communication Network Security |
- 通信与信息工程
Ad hoc和传感器网络
嵌入式网络
高速接入网
家庭和SOHO网络
IPv6部署和迁移
局域网
光网络
叠加网络
对等网络
个人和可穿戴网络
路由和调度
存储区域网络
无所不在的网络
无线网络
多媒体和实时通讯
网络管理
网络可靠性和安全性
网络流量表征
跨层设计与优化
传播与信息论
通讯软件和服务
通信协议和算法
无线通讯和网络
宽带无线接入
合作通讯和网络
光通信与网络
宽带网络和协议
互联网服务,系统和应用
P2P通讯和网络
普适计算和网格网络
通讯网络安全
|
|
|
- Information and network security
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Malware and botnets
Communication Privacy and Anonymity
Distributed denial of service
Public Key Infrastructures, key management, credentials
Web security
Secure Routing, Naming/Addressing, Network Management
Security & Privacy in Pervasive and Ubiquitous Computing
Security & Privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems
Information leakage
Information theft
Data tampering
Data deletion
computer virus
Security breach
Attack monitoring
Encrypted communication
Information dissemination safety
Network isolation
Application security
Email security
Anti-virus and anti-malware software
Network segmentation
Application security
Behavioral analytics
Cloud security
Intrusion prevention systems
Mobile device security
Security information and event management
Wireless security
|
- 信息与网络安全
有线,无线,移动,混合,传感器,Ad Hoc网络中的安全性和隐私
网络入侵检测和防护,防火墙,数据包过滤器
恶意软件和僵尸网络
通信隐私和匿名
分布式拒绝服务
公共密钥基础结构,密钥管理,凭证
网络安全
安全的路由,命名/寻址,网络管理
普适计算中的安全性和隐私
新兴技术的安全性和隐私性:VoIP,对等和覆盖网络系统
信息泄漏
信息盗窃
数据篡改
资料删除
电脑病毒
安全漏洞
攻击监控
加密通讯
信息传播安全
网络隔离
应用安全
电邮安全
防病毒和防恶意软件
网络细分
应用安全
行为分析
云安全
入侵防御系统
移动设备安全
安全信息和事件管理
无线网络安全 |
|
|
Track 3: Data security - 数据安全
Cryptography and Encryption Techniques: Advances in cryptographic algorithms and their applications in securing data.
Data Integrity and Authenticity: Techniques for ensuring data is accurate and has not been altered maliciously.
Cloud Security: Strategies for securing data stored in cloud environments, including access controls and encryption methods.
Network Security Protocols: Examination of protocols that enhance data security during transmission.
Machine Learning for Threat Detection: Utilizing AI and ML to identify and respond to potential security breaches in real-time.
Application Security: Best practices for securing mobile and web applications against data breaches.
Incident Response and Management: Approaches for rapid response to data security breaches and restoration of services.
Security in IoT Devices: Challenges and solutions in securing data transmitted from Internet of Things devices.
Data Backup and Recovery Solutions: Techniques for ensuring data availability and integrity in case of a breach.
Regulatory Compliance: Understanding GDPR, HIPAA, and other regulations affecting data protection and security measures. |
|
|
Track 4: Privacy Protection - 隐私保护
Data Anonymization Techniques: Methods to remove personal identifiers from datasets while maintaining data utility.
User Consent and Data Collection: Implications of user consent management regarding data collection practices.
Privacy by Design: Incorporating privacy measures into the development process of systems and services.
Surveillance and Data Privacy: The impact of government and corporate surveillance on personal privacy.
Privacy Enhancing Technologies (PETs): Tools and methodologies for enhancing individual privacy online.
Blockchain for Privacy Protection: Exploring how blockchain can be used to enhance data privacy.
Ethical Considerations in Data Handling: The role of ethics in data collection, processing, and sharing practices.
Cross-Border Data Transfers: Legal and technical challenges related to transferring data across international borders.
Consumer Privacy Rights: An analysis of consumer rights regarding their personal data under various regulations.
Impact of AI on Privacy: The implications of artificial intelligence on personal privacy and data handling. |