The 5th Int'l Conference on Information Security and Network Security(ISNS 2025)

ISNS 2025


Computer Networks & Wireless Communication Databases & Information Systems



The 5th Int'l Conference on Information Security and Network Security(ISNS 2025) 



Websitehttps://www.academicx.org/ISNS/2025/



DateJuly 18-20, 2025



Venue Kunming, China



The 5th Int'l Conference on Information Security and Network Security (ISNS 2025) will be held during July 18-20, 2025 in Kunming, China. The conference will cover issues on Access Control, Anti-Virus and Anti-Worms, Authentication and Authorization, Active Defense Systems, Adaptive Defense Systems, Analysis, Benchmark of Security Systems, Biometric Security, Complex Systems Security, etc. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods in related fields. Attendees will have the opportunity to showcase their research progress, discover emerging trends, and network with fellow professionals in a collaborative environment.



 



Kunming, also known as Yunnan-Fu, is the capital and largest city of Yunnan province, China. It is the political, economic, communications and cultural centre of the province as well as the seat of the provincial government. The headquarters of many of Yunnan's biggest corporations are based in the city. The city was of great significance during World War II as a Chinese military center, American air base, and transport terminus for the Burma Road. In the middle of the Yunnan–Guizhou Plateau, Kunming is at an altitude of 1,900 metres (6,234 feet) above sea level and a latitude just north of the Tropic of Cancer. As of 2020 census, Kunming had a total population of 8,460,088 inhabitants, of whom 5,604,310 lived in its built-up (or metro) area made of all urban districts but Jinning, not conurbated yet. It is at the northern edge of Dian Lake, surrounded by temples and lake-and-limestone hill landscapes.



 



We're looking forward to seeing you in Kunming!



 



 



 



Attendance Methods



1.Regular Attendance ( No Submission Required )



You're also welcome to attend our conference (without submitting full paper or abstract)



2.Abstract submission



Submit abstract ( Regular Attendance + Abstract + Presentation )



You are welcome to submit abstract for oral presentation or poster presentation.



3. Full Paper submission



Submit full paper ( Regular Attendance + Paper Publication + Presentation )



You are invited to submit papers and participate in our academic exchange. One author will be invited to make an oral presentation and the paper will be published by peer-reviewed open access journal.



 



Publication and Presentation



Publication: All the accepted papers will be published by a peer-reviewed open access journal that can ensure the widest dissemination of your published work, for more information, please contact us (contact7@academicx.org).



Index: CNKI and Google Scholar



 



Note:



1. Manuscripts should be submitted by one of the authors of the manuscript through the online registration/submission system or official email.



2. If you want to present your research results but do NOT wish to publish a paper, you may simply submit an Abstract only.



3. All manuscripts are expected to be prepared as a single PDF or MS Word document with the complete text, references, tables and figures included. Any revised manuscripts prepared for publication should be sent as a single editable Word document. LaTex paper is also acceptable for publication, but it should be in PDF for review first.



4. Please click Template for Manuscripts button to download the Full Paper template and prepare your article according to it. The full length of one paper is suggested to be about 15 pages (within the template format with all tables, figures and references). If your paper is over 20 pages, you will be kindly requested to pay for extra pages fees.



5. The simple Abstract submission should include the title, contents, keywords, authors names, affiliations and emails. The length is suggested to be controlled within 1 page and no more than 2 pages.



6. You will receive the review results within 5-7 working days after submission. If you do not get any notification within the time limit, please contact us as soon as possible.



7. You are welcome to submit papers in Chinese and please contact us for more details.



Contact Us



Email:contact7@academicx.org (intelconf@163.com)



Whatsapp: 0086 18672346485



Tel: +86 18627814037



QQ: 1349406763



WeChat: 18627814037  /  3025797047



Official Account: Academic Communications 



 



Topics: The conference is soliciting state-of-the-art research papers in the following areas of interest:



 



Anti-Virus and Anti-Worms  Trusted Computing and Trustworthy Computing Technology



Access Control



Anti-Virus and Anti-Worms



Authentication and Authorization



Active Defense Systems



Adaptive Defense Systems



Analysis, Benchmark of Security Systems



Biometric Security



Complex Systems Security



Cryptography



Data and System Integrity



Database Security



Distributed Systems Security



Data Protection



Electronic Commerce Security



Fraud Control



High Performance Network Virtualization



High Performance Security Systems



Hardware Security



Information Hiding and Watermarking



Information Privacy



Information Security Engineering



Intellectual Property Protection



Intrusion Detection



Internet and Network Forensics



Intrusion Detection and Prevention



Key Management and Key Recovery



Language-based Security



Large-scale Attacks and Defense



Network Security



Risk Evaluation and Security Certification



Security and Privacy for Social Computing



Security Evaluation



Security for Mobile Computing



Security Models



Security Protocols



Signature and Key Agreement Protocol



Software Security



Security in Cloud and Grid Systems



Security in Pervasive/Ubiquitous Computing



Security and Privacy in Smart Grid



Security and Privacy in Wireless Networks



Secure Mobile Agents and Mobile Code



Security Policy



Security Protocols



Security Simulation and Tools



Standards and Assurance Methods