国产v亚洲v天堂无码久久无码_久久久久综合精品福利啪啪_美女扒开尿口让男人桶_国产福利第一视频在线播放_滨崎步无码AⅤ一区二区三区_三年片免费观看了_大屁股妇女流出白浆_泷川苏菲亚无码AV_我想看我想看一级男同乱伦_国产精品午夜福利免费视频,gogo国模全球大胆高清摄影图,2008门艳照全集视频,欧美午夜在线精品品亚洲AV中文无码乱人伦在线播放

擔(dān)任DSC2016PC member,,歡迎大家投稿。
來源: 劉憶寧/
無業(yè)
2818
8
0
2018-04-03

http://dsc2018.nsysu.edu.tw/

The 2018 IEEE Conference on Dependable and Secure Computing

Kaohsiung ? Taiwan | December 10—13, 2018


Regular Track: Computer Systems, Networks and Software/Hardware

  • Advanced Persistent Threat (APT)

  • Network Attack and Defense Techniques

  • Botnet and Intrusion Detection

  • Cryptographic Methods and Toolkits

  • Cyber attacks

  • Software Vulnerabilities and Security

  • Database Security and Privacy

  • Embedded Systems and IoT Devices

  • Mobile and Cloud Computing security

  • AI and Big Data Analysis for security

  • Malware Mutation

  • Deep Learning for Attack and Defense

  • Block Chain and Finance Security

  • Security Hardware and Circuits

  • Authentication and Authorization

  • Soft-Error Analysis and Models

  • CAD Algorithms and Tools

  • Electronic Circuits and Systems

  • Fault-Tolerance and Reliability

  • Industrial Design Experiences

  • Noise- and Power-Aware Designs

  • Stochastic Circuits and Systems

  • Temperature-Aware Designs

  • Variable-Latency Designs

 

Experience and Practice

The DSC conference will also include a submission category for experience and practice papers on new findings in the two aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:

  • Attacks on Information Systems and Digital Storage

  • CSIRTs, Incident Analysis and Response

  • Hacking Techniques and Countermeasures

  • Honeypots/Honeynets

  • Malware Analysis and Reversing

  • Mobile Communications Security and Vulnerabilities

  • Newly discovered vulnerabilities

  • Offensive Information Technology

  • Reverse Engineering, Forensics, and Anti-Forensics

  • Spyware, Phishing and Distributed Attacks

  • VLSI/CAD Design Knowhow


登錄用戶可以查看和發(fā)表評論,, 請前往  登錄 或  注冊,。
SCHOLAT.com 學(xué)者網(wǎng)
免責(zé)聲明 | 關(guān)于我們 | 聯(lián)系我們
聯(lián)系我們: