{"id":171,"date":"2021-07-11T07:46:22","date_gmt":"2021-07-11T07:46:22","guid":{"rendered":"https:\/\/ncs2019.esam.io\/?page_id=171"},"modified":"2021-07-11T14:57:48","modified_gmt":"2021-07-11T14:57:48","slug":"index","status":"publish","type":"page","link":"https:\/\/ncs2019.esam.io\/","title":{"rendered":"E\u5316\u9451\u8b58\u3001\u7db2\u99ed\u653b\u9632\u8207\u91ab\u7642\u8cc7\u7db2\u5b89\u5168"},"content":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_last_edited=”off|desktop” admin_label=”Hero” _builder_version=”3.22″ use_background_color_gradient=”on” background_color_gradient_start=”#ffffff” background_color_gradient_end=”#e7edf9″ custom_margin=”|||” custom_padding=”100px||100px|” custom_padding_tablet=”130px||130px|”][et_pb_row admin_label=”title and illustration” _builder_version=”4.7.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”|||”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ header_font=”Merriweather|700|||||||” header_font_size=”46px” header_line_height=”1.3em” custom_margin=”||0px|” animation_style=”flip” animation_direction=”top”]<\/p>\n

NCS 2019<\/h1>\n

E\u5316\u9451\u8b58\u3001\u7db2\u99ed\u653b\u9632\u8207\u91ab\u7642\u8cc7\u7db2\u5b89\u5168<\/h1>\n

[\/et_pb_text][et_pb_divider color=”#4646c4″ divider_position=”center” divider_weight=”2px” _builder_version=”3.2″ max_width=”90px” max_width_tablet=”12%” max_width_last_edited=”off|desktop” custom_margin=”|||” animation_style=”flip” animation_delay=”50ms”][\/et_pb_divider][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”20px” text_line_height=”1.8em” custom_margin=”25px|||” animation_style=”flip” animation_direction=”top” animation_delay=”100ms”](Workshop on E-SECURITY in FORENSICS, MEDICAL, and COMPUTING SERVICES AND APPLICATIONS )[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Speakers” _builder_version=”3.22″ width=”100%” custom_padding=”90px||90px|” animation_style=”zoom” animation_intensity_zoom=”10%”][et_pb_row column_structure=”1_3,2_3″ _builder_version=”3.25″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https:\/\/ncs2019.esam.io\/wp-content\/uploads\/2021\/07\/\u98a8\u7345\u723a.jpg” title_text=”\u98a8\u7345\u723a” _builder_version=”4.7.4″ custom_margin=”|||” custom_margin_tablet=”90px|||” custom_margin_last_edited=”off|desktop” hover_enabled=”0″ always_center_on_mobile=”off” locked=”off” sticky_enabled=”0″][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

\u8209\u884c\u6642\u9593\u8207\u5730\u9ede<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ _module_preset=”default” header_3_font=”|700|||||||” header_3_font_size=”25px” header_3_line_height=”1.5em”]<\/p>\n

\u65e5\u671f: 108\u5e7411\u670814-15\u65e5 \u661f\u671f\u56db-\u661f\u671f\u4e94<\/h3>\n

\u5730\u9ede: \u91d1\u9580\u5927\u5b78\u8209\u884c<\/h3>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Aim and Scope<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

\u5728\u8cc7\u8a0a\u76f8\u95dc\u9818\u57df\u6709\u60a0\u4e45\u7684\u6b77\u53f2\uff0c\u4eab\u6709\u76db\u540d\u5169\u5e74\u4e00\u6b21\u7684\u5168\u570b\u8a08\u7b97\u6a5f\u6703\u8b70 (National Computer Symposium, NCS for a short) \u5c0d\u65bc\u63d0\u5347\u6211\u570b\u5b78\u8853\u767c\u5c55\u8207\u8a08\u7b97\u6a5f\u7522\u696d\u63a8\u5c55\u6709\u76f8\u7576\u5927\u7684\u52a9\u76ca\u3002\u6b77\u5c46\u6703\u8b70\u532f\u805a\u4e86\u5168\u570b\u5404\u9818\u57df\u7684\u83c1\u82f1\uff0c\u5c07\u8a31\u591a\u5091\u51fa\u7684\u6210\u679c\u5728\u5927\u6703\u4e0a\u767c\u8868\uff0c\u540c\u6642\u4f86\u81ea\u570b\u5167\u5916\u7684\u5c08\u5bb6\u5b78\u8005\u9032\u884c\u5fc3\u5f97\u5206\u4eab\u8207\u610f\u898b\u4ea4\u63db\uff0c\u4fc3\u6210\u7522\u5b98\u5b78\u5404\u754c\u4e4b\u4ea4\u6d41\uff0c\u4e5f\u8b93\u7814\u7a76\u6c34\u6e96\u5f97\u4ee5\u63d0\u5347\u3002\u56e0\u6b64\uff0cNCS \u5df2\u6210\u70ba\u570b\u5167\u8a08\u7b97\u6a5f\u7814\u7a76\u8207\u61c9\u7528\u4e4b\u91cd\u5927\u6307\u6a19\u578b\u6703\u8b70\u3002
\n<\/h4>\n

Computer and Internet crimes are on the rise due to the fast paced development of computer and Internet technology and the techniques to combat these crimes are required more and more on a daily basis. Therefore, with the focus on subjects related to information security, Internet communications and electronic business security become very essential.<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

2019 Workshop on E-SECURITY in FORENSICS, MEDICAL, and COMPUTING SERVICES AND APPLICATIONS (E\u5316\u9451\u8b58\u3001\u7db2\u99ed\u653b\u9632\u8207\u91ab\u7642\u8cc7\u7db2\u5b89\u5168)<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

intends to provide a forum for researchers, educators, and professionals to exchange their discoveries, practices and cutting-edge research achievements covering those aspects of security with the forensics, medical concerns, computing services and applications. The workshop also explores future trends and applications in these areas and other related areas. Your Participation at the workshop would be an excellent opportunity for you to meet other researchers and to discuss the technology advancements. The 2019 National Computer Symposium (NCS 2019) will be held on Nov. 14-15, 2019 @ National Quemoy University (\u570b\u7acb\u91d1\u9580\u5927\u5b78) TAIWAN, <\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Topic of Interests<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

Areas of interest include, but are not limited to, the following topics:
\n* Digital forensics surveillance technology and procedure
\n* Authentication and privacy in security
\n* Medical protection systems
\n* Network attack and defense program studies
\n* Information leakage in conglomerate
\n* Information hiding, malicious code, and steganography
\n* Attack and cryptanalysis in network systems
\n* Copyright protections and personal privacy
\n* Mobile service and security in applications
\n* Technology law related privacy and protection
\n* Personal privacy and medical security in internet applications
\n* Phishing and online fraud preventions
\n* Applied\/commercial cryptography
\n* Commercial cryptographic applications
\n* Information Law with personal privacy
\n* Custody of evidence chain in networking systems
\n* Security and privacy in wireless communications
\n* Integrity of digital evidence and live investigations
\n* Incident response and investigation in communications
\n* Location privacy and authentication in vehicle systems
\n* Vehicular ad-hoc network (VANET) security
\n* Security and privacy in ubiquitous computing and context-aware applications
\n* Forensic analysis and tracing traitors
\n* RFID applications and security countermeasures
\n* Cyberstalking investigations in network activities
\n* Web services\/XML forensics
\n* Computer and network security and applications
\n* Formal methods in network forensic computing
\n* Legal, ethical and policy issues in network forensics
\n* Social networking forensics
\n* Cloud forensics
\n* Network forensics case studies
\n* Data mining for evidence trace in networks
\n* Multimedia analysis for forensics
\n* Communication protocols in network forensics
\n* Network forensics
\n* Fraud detection
\n* Cloud computing security
\n<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Journal Publication Recommendations<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

1.\tJournal of Supercomputing (SCI)
\n2.\tMultimedia Tools and Applications (SCI)
\n3.\tPeer-to-Peer Networking and Applications (SCI)
\n4.\tJIHMS- Journal of Information Hiding and Multimedia Signal Processing (EI)
\n5.\tInternational Journal of Network Security (EI)
\n6.\tJournal of Chung Cheng Institute of Technology (\u4e2d\u6b63\u5dba\u5b78\u5831) (EI)
\n7.\tJournal of Information, Technology, and Society
\n<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Important Dates<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

Paper submission deadline: see NCS 2019 web-page
\nNCS 2019 Submission: see NCS 2019 web-page
\nNotification of Acceptance: see NCS 2019 web-page
\nFinal Camera Ready Paper Submission: see NCS 2019 web-page
\nConference: see NCS 2019 web-page
\n<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_ […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/pages\/171"}],"collection":[{"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":8,"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/pages\/171\/revisions"}],"predecessor-version":[{"id":200,"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/pages\/171\/revisions\/200"}],"wp:attachment":[{"href":"https:\/\/ncs2019.esam.io\/wp-json\/wp\/v2\/media?parent=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}