Scopes
Topic 1: Communication Security
Access control
Network security
Computer and digital forensics
Social network security, privacy, and trust
Language-based security
Security protocols and verification
Intrusion detection
Software Defined Network Security
Anonymity
Safety management
Web Security
Embedded System Security
Security Models, Standards, and Policies
Fraud and cybercrime
Trust and Reputation System
Authentication and authorization
Big Data Security and Privacy
Mobile Computing Security and Privacy
Applied cryptography
Hardware security
Key Management and Key Recovery
Identity Access Management
Infrastructure security
Cloud and edge computing Security
Available Security and Privacy
Blockchain Security and Privacy
Trusted Computing and Trustworthy Computing
Operating System Security
Internal threat detection
Cyber Physical System Security
Privacy Protection
Intellectual Property Protection
Risk assessment
Data and System Integrity
Privacy Preserving Data Mining
Database security
IoT Security and Privacy
Distributed System Security
Malicious software and countermeasures
Wireless security
Topic 2: Risk Management
Risk management
Risk Management Theory, Methods, and Applications
Risk identification, analysis, and response
Risk aversion
Risk Retention
Risk sharing
Risk transfer
Prevent and reduce risk losses
Risk and Emergency Management System
Risk measurement and prediction
Risk assessment and failure analysis
Risk propagation pathway
Crisis response and emergency management
Systems Engineering and Risk Management
Reliability Engineering and Risk Management
Social risk management
Financial Risk Management
Enterprise risk management
Supply chain risk management
Environmental Risk Management
Recovery, sustainable development, and reducing future risks
Risk Analysis and Management Driven by Big Data
Risk Management and Big Data
Public Emotions and Risk Perception
The Application of Big Data in Epidemic Risk Management
Risk Analysis and Management Based on Artificial Intelligence Technology
Research on Artificial Intelligence and Public Policy
Food Safety and Artificial Intelligence
Risk Management and Intelligent Pricing
Topic 3: Information Science
Data Analysis and Database
Information security
Encryption technology
Network security
Data mining
Image processing
Information system
Important Dates/重要日期
  • Submission Deadline: 2025.5.26
  • Registration Deadline: 2025.5.31
  • Conference Date: 2025.6.15
  • Notification Date: About a week after the submission
Submission Portal/投稿方式

Mail Address:  info_nccs@126.com

If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:

唐老师
  • +86-17168296597(微信同号)
  • 3264234551
--
  • +86---(微信同号)
  • --