{"id":7876,"date":"2019-07-31T09:56:38","date_gmt":"2019-07-31T02:56:38","guid":{"rendered":"http:\/\/eng.ui.ac.id\/?p=7876"},"modified":"2019-07-31T09:57:08","modified_gmt":"2019-07-31T02:57:08","slug":"ieee-conference-on-applications-information-and-network-security-2019-2","status":"publish","type":"post","link":"https:\/\/eng.ui.ac.id\/en\/ieee-conference-on-applications-information-and-network-security-2019-2\/","title":{"rendered":"IEEE Conference on Applications, Information\u00a0and Network Security\u00a02019"},"content":{"rendered":"<div id=\"awesomewrap\"><\/div>\n<p><center><\/p>\n<table id=\"bodyTable\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td id=\"bodyCell\" align=\"center\" valign=\"top\">\n<table class=\"templateContainer\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td id=\"templatePreheader\" valign=\"top\">\n<table class=\"mcnTextBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnTextBlockOuter\">\n<tr>\n<td class=\"mcnTextBlockInner\" valign=\"top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"templateHeader\" valign=\"top\">\n<table class=\"mcnImageBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnImageBlockOuter\">\n<tr>\n<td class=\"mcnImageBlockInner\" valign=\"top\">\n<table class=\"mcnImageContentContainer\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnImageContent\" valign=\"top\"><img class=\"mcnImage\" src=\"https:\/\/gallery.mailchimp.com\/5af784fd977f0009afd51755b\/images\/b0bbf477-bee5-4830-b88c-989f03730196.png\" alt=\"\" width=\"400\" align=\"center\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"templateBody\" valign=\"top\">\n<table class=\"mcnTextBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnTextBlockOuter\">\n<tr>\n<td class=\"mcnTextBlockInner\" valign=\"top\">\n<table class=\"mcnTextContentContainer\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnTextContent\" valign=\"top\">\n<h2>Call for Papers:<strong><br \/>\nIEEE Conference on Applications, Information\u00a0and Network Security\u00a02019<\/strong><\/h2>\n<h3><strong>Penang Island, Malaysia<\/strong><\/h3>\n<h4>19 \u2013 21\u00a0November 2019<\/h4>\n<p><strong>where\u00a0KNOWLEDGE\u00a0meets\u00a0CULTURES<\/strong><br \/>\nDear respected authors\/ academicians\/ researchers\/ industrialists,<\/p>\n<p>We apologize in advance if you receive multiple copies of this e-mail. We would also like to thank you for taking a few minutes of your time to read our sincere invitation below.<\/p>\n<p>The 2019 IEEE Conference on Applications, Information and Network Security will be held in Penang, Malaysia on 19 \u2013 21 November 2019. The conference provides an excellent opportunity to share and exchange advancement in research, technologies and applications in the area of computer and network security for professionals, engineers, academics and industrial people worldwide.\u00a0 AINS 2019 is sponsored by IEEE Computer Society Malaysia.<\/p>\n<p>AINS 2019\u00a0will be held in the beautiful cultural\u00a0island of Penang, bringing you an inspirational experience\u00a0<strong>where knowledge meets cultures.<\/strong><\/p>\n<p>* The Proceedings of IEEE conferences historically will be included in the<strong>\u00a0IEEE Xplore\u00a0<\/strong>and\u00a0<strong>SCOPUS<\/strong>\u00a0databases. IEEE reserves the right to exclude a paper from distribution after the conference (i.e. removal from IEEE Xplore) if the paper is not presented at the conference.<\/p>\n<p>* All presented papers will be invited for an extended journal submission for IEEE Computer Society Malaysia journal. Selected papers will also be invited to submit an extended version to\u00a0<strong>Inderscience International Journal of Digital Enterprise Technology (IJDET)<\/strong>.<br \/>\n<strong>Full paper Submission:\u00a031\u00a0July\u00a02019<br \/>\nNotification of Acceptance: 31<\/strong><strong>\u00a0August\u00a02019<\/strong><\/p>\n<p>Please submit your paper at :\u00a0<a href=\"https:\/\/edas.info\/N24170\">https:\/\/edas.info\/N24170<\/a><\/p>\n<p><strong>For more information, please visit:<\/strong><br \/>\nConference Website :\u00a0<a href=\"https:\/\/ieeecomputer.my\/ains2019\/\">https:\/\/ieeecomputer.my\/ains2019\/<\/a><br \/>\nJoin us on Facebook:\u00a0<a href=\"https:\/\/www.facebook.com\/groups\/IEEECSMalaysia\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.facebook.com\/groups\/IEEECSMalaysia\/<\/a><br \/>\nJoin us on Twitter\u00a0 \u00a0 \u00a0:\u00a0<a href=\"https:\/\/twitter.com\/ieeecomputermy\" target=\"_blank\" rel=\"noopener\">https:\/\/twitter.com\/ieeecomputermy<\/a><\/p>\n<h2>\n<strong>Tracks<\/strong><\/h2>\n<p>The conference welcomes papers on the following (but not limited to) research topics:<\/p>\n<p><strong>Application Security<\/strong><\/p>\n<ul>\n<li>Electronic Commerce<\/li>\n<li>E-Learning and M-Learning Applications<\/li>\n<li>E-Government<\/li>\n<li>Healthcare Information System Security<\/li>\n<li>Enterprise Systems Security<\/li>\n<li>Internet of Things Security<\/li>\n<li>Grid and Cloud Applications Security<\/li>\n<li>Smartphone and Mobile Applications Security<\/li>\n<li>Security of Web-based Applications and Services<\/li>\n<li>Malware and Anti-Malware<\/li>\n<li>Information Hiding and Digital Forensics<\/li>\n<li>Steganography, Watermarking<\/li>\n<li>Biometrics Applications and Technologies<\/li>\n<li>Electronic Passports, National ID and Smart Card Security<\/li>\n<li>Trusted Computing<\/li>\n<li>Surveillance Systems<\/li>\n<li>Social Network Security<\/li>\n<li>Executable Content and Content Filtering<\/li>\n<li>Virtual Machine Security<\/li>\n<\/ul>\n<p><strong>Information Security<\/strong><\/p>\n<ul>\n<li>Database Security<\/li>\n<li>Fraud Control<\/li>\n<li>Intrusion Detection and Prevention<\/li>\n<li>Cryptography and Privacy<\/li>\n<li>Security Models and Protocols<\/li>\n<li>Business Continuity &amp; Disaster Recovery Planning<\/li>\n<li>Critical Infrastructure Protection<\/li>\n<li>Digital Rights Management and Intellectual Property Protection<\/li>\n<li>Risk Evaluation and Security Certification<\/li>\n<li>Security Management<\/li>\n<li>Authentication and Access Control<\/li>\n<li>Anonymity<\/li>\n<li>Social Engineering<\/li>\n<li>Operating System Security<\/li>\n<li>Identity Management<\/li>\n<li>Key Management and Key Recovery<\/li>\n<li>Security Policies and Trust Management<\/li>\n<li>Legal Issues<\/li>\n<li>SCADA and Embedded systems security<\/li>\n<\/ul>\n<p><strong>Network Security<\/strong><\/p>\n<ul>\n<li>Intranet Technologies Security<\/li>\n<li>Bluetooth Technology Security<\/li>\n<li>Ad-hoc Networks Security<\/li>\n<li>Heterogeneous Networks Security<\/li>\n<li>Broadband and High Speed Network Security<\/li>\n<li>VoIP Security<\/li>\n<li>Wireless Network Security<\/li>\n<li>Peer to Peer Security<\/li>\n<li>Software Defined Radio and RF Security<\/li>\n<li>Security in Cloud Computing<\/li>\n<li>Hardware-Based security<\/li>\n<li>Security for Future Networks<\/li>\n<li>Distributed and Pervasive Systems Security<\/li>\n<\/ul>\n<p>See you in Langkawi, Malaysia<br \/>\nChair<br \/>\nAINS 2019<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td id=\"templateFooter\" valign=\"top\">\n<table class=\"mcnFollowBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnFollowBlockOuter\">\n<tr>\n<td class=\"mcnFollowBlockInner\" align=\"center\" valign=\"top\">\n<table class=\"mcnFollowContentContainer\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\">\n<table class=\"mcnFollowContent\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\" valign=\"top\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td align=\"center\" valign=\"top\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowContentItemContainer\" valign=\"top\">\n<table class=\"mcnFollowContentItem\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"middle\">\n<table border=\"0\" width=\"\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowIconContent\" align=\"center\" valign=\"middle\" width=\"24\"><a href=\"http:\/\/www.twitter.com\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"\" src=\"https:\/\/cdn-images.mailchimp.com\/icons\/social-block-v2\/color-twitter-48.png\" width=\"24\" height=\"24\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowContentItemContainer\" valign=\"top\">\n<table class=\"mcnFollowContentItem\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"middle\">\n<table border=\"0\" width=\"\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowIconContent\" align=\"center\" valign=\"middle\" width=\"24\"><a href=\"http:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"\" src=\"https:\/\/cdn-images.mailchimp.com\/icons\/social-block-v2\/color-facebook-48.png\" width=\"24\" height=\"24\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowContentItemContainer\" valign=\"top\">\n<table class=\"mcnFollowContentItem\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"middle\">\n<table border=\"0\" width=\"\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnFollowIconContent\" align=\"center\" valign=\"middle\" width=\"24\"><a href=\"http:\/\/mailchimp.com\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"\" src=\"https:\/\/cdn-images.mailchimp.com\/icons\/social-block-v2\/color-link-48.png\" width=\"24\" height=\"24\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"mcnDividerBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnDividerBlockOuter\">\n<tr>\n<td class=\"mcnDividerBlockInner\">\n<table class=\"mcnDividerContent\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"mcnTextBlock\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody class=\"mcnTextBlockOuter\">\n<tr>\n<td class=\"mcnTextBlockInner\" valign=\"top\">\n<table class=\"mcnTextContentContainer\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td class=\"mcnTextContent\" valign=\"top\"><em>Copyright \u00a9 2019 Conference and Journals, All rights reserved.<\/em><\/p>\n<p>Want to change how you receive these emails?<br \/>\nYou can\u00a0<a href=\"https:\/\/ieeemy.us15.list-manage.com\/profile?u=5af784fd977f0009afd51755b&amp;id=b0c75a7e45&amp;e=898be5e82d\">update your preferences<\/a>\u00a0or\u00a0<a href=\"https:\/\/ieeemy.us15.list-manage.com\/unsubscribe?u=5af784fd977f0009afd51755b&amp;id=b0c75a7e45&amp;e=898be5e82d&amp;c=0e37c61833\">unsubscribe from this list<\/a>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers: IEEE Conference on Applications, Information\u00a0and Network Security\u00a02019 Penang Island, Malaysia 19 \u2013 21\u00a0November 2019 where\u00a0KNOWLEDGE\u00a0meets\u00a0CULTURES Dear respected authors\/ academicians\/ researchers\/ industrialists, We apologize in advance if you receive multiple copies of this e-mail. We would also like to thank you for taking a few minutes of your time to read our sincere [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[127],"tags":[],"_links":{"self":[{"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/posts\/7876"}],"collection":[{"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/comments?post=7876"}],"version-history":[{"count":2,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/posts\/7876\/revisions"}],"predecessor-version":[{"id":7878,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/posts\/7876\/revisions\/7878"}],"wp:attachment":[{"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/media?parent=7876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/categories?post=7876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eng.ui.ac.id\/en\/wp-json\/wp\/v2\/tags?post=7876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}