Zhiqiang Lin, Charalampos Papamanthou, M. Polychronakis
{"title":"信息安全:第22届国际会议,ISC 2019,纽约,美国,2019年9月16-18日,会议录","authors":"Zhiqiang Lin, Charalampos Papamanthou, M. Polychronakis","doi":"10.1007/978-3-030-30215-3","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":"39 1","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings\",\"authors\":\"Zhiqiang Lin, Charalampos Papamanthou, M. Polychronakis\",\"doi\":\"10.1007/978-3-030-30215-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":51851,\"journal\":{\"name\":\"Information Security Journal\",\"volume\":\"39 1\",\"pages\":\"\"},\"PeriodicalIF\":1.6000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/978-3-030-30215-3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-3-030-30215-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
期刊介绍:
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insight into current and existing professional development issues. We welcome submissions that cover the following topics: Security Access Control Systems and Security Methodology Security Telecommunications and Network Security Business Continuity Planning and Disaster Recovery Planning Security Management Practices Security Architecture and Models Law, Investigation, and Ethics in Information Security Application and Systems Development Security Cryptography security Computer Operations Security Physical Security We are especially keen to receive manuscripts that explore Cloud Security, Health Care Information Security and Privacy and Cyber Forensics