【CCF推荐-C类】计算机学术会议截稿信息2条

中国计算机学会推荐国际学术会议和期刊目录自2010年8月首次发布以来,已历经五版,得到了计算机领域科研工作者的广泛关注。

目录共包含十个领域,分为ABC三类:A类是国际上极少数顶会与顶刊;B类代表领域内高水平的会议与期刊;C类指国际上重要的、为学术界所认可的优秀会议和期刊。

►►►

FMCAD 2024

FMCAD 2024 is the twenty-fourth in a series of conferences on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.

FMCAD was first held in 1996, and was a bi-annual conference until 2006, when the FMCAD and CHARME conferences merged into a single annual conference. Before merging, FMCAD was held in the United States on even years and its sister conference, CHARME, was held in Europe on odd years. Since 2006, the FMCAD conference has been held annually at various international venues.

所属领域:计算机科学理论

CCF分级:C类

时间地点:2024年10月14日-布拉格(捷克)

截稿时间:2024年4月28日

大会官网:https://fmcad.org/FMCAD24

大会征文

Model checking, theorem proving, equivalence checking, abstraction and reduction, compositional methods, decision procedures at the bit- and word-level, probabilistic methods, combinations of deductive methods and decision procedures.

Synthesis and compilation for computer system descriptions, modeling, specification, and implementation languages, formal semantics of languages and their subsets, model-based design, design derivation and transformation, correct-by-construction methods.

Application of formal and semi-formal methods to functional and non-functional specification and validation of hardware and software, including timing and power modeling, verification of computing systems on all levels of abstraction, system-level design and verification for embedded systems, cyber-physical systems, automotive systems and other safety-critical systems, hardware-software co-design and verification, and transaction-level verification.

Experience with the application of formal and semi-formal methods to industrial-scale designs; tools that represent formal verification enablement, new features, or a substantial improvement in the automation of formal methods.

Application of formal methods to verifying safety, connectivity and security properties of networks, distributed systems, smart contracts, block chains, and IoT devices.

Application of formal methods to the analysis of machine learning systems, and applications of machine learning to enhance formal methods techniques.

►►►

ICDF2C 2024

The International Conference on Digital Forensics and Cyber Crime will be held from October 9 -- 10, 2024, in Dubrovnik, Croatia.

This two-day event is expected to attract over 100 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The focus is on emerging topics including the use of Artificial Intelligence and Machine Learning in digital forensics as well as adversary engagement and threat intelligence for cyber security. In addition, we will have our traditional security and forensics topics of digital investigations, cyber security, behavioral cyber security, incident response, risk management, business, etc. Given below is an indicative list of possible topics.

所属领域:网络与信息安全

CCF分级:C类

时间地点:2024年10月9日-克罗地亚

截稿时间:2024年4月30日

大会官网:https://icdf2c.eai-conferences.org/2024

大会征文

The focus of the conference is on:

Cyber security

Digital forensics

Digital criminal investigations

Artificial intelligence and analytics for security and forensics

National intelligence

Topics include:

Digital forensics

Intrusion detection

Active defense

Cyber-physical system threats

Cyber warfare

AI/ML threats

Themes also include:

Text analysis

Cryptocurrencies

Hardware trojans

Topics include:

Digital and Multimedia Evidence and Forensics

Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts)

Chip Forensics

Mobile & Network Forensics

ICS/SCADA Forensics

Live Data Forensics

Forensic Lab Management and Accreditation

e-Discovery

相关推荐
卧室小白1 分钟前
Redis-哨兵模式
数据库·redis·缓存
生成论实验室2 分钟前
《事件关系阴阳博弈动力学:识势应势之道》第一篇:生成正在发生——从《即事经》到事件-关系网络
人工智能·科技·算法·架构·创业创新
GottdesKrieges5 分钟前
OceanBase恢复常见问题
java·数据库·oceanbase
其实防守也摸鱼15 分钟前
CTF密码学综合教学指南--第三章
开发语言·网络·python·安全·网络安全·密码学
其实防守也摸鱼17 分钟前
CTF密码学综合教学指南--第四章
网络·笔记·安全·网络安全·密码学·ctf
卧室小白27 分钟前
redis-配置
数据库·redis·缓存
生成论实验室1 小时前
《事件关系阴阳博弈动力学:识势应势之道》第二篇:阴阳博弈——认知的动力学基础
数据结构·人工智能·科技·神经网络·算法
向風而行1 小时前
MySQL详解
数据库·mysql
草履虫君1 小时前
VMware 虚拟机网络性能优化指南:从 11 秒到 4 秒的完整调优实践
服务器·网络·经验分享·性能优化
@insist1231 小时前
信息安全-防火墙技术演进全景:从代理NAT 到下一代及专项防火墙
网络·安全·web安全·软考·信息安全工程师·软件水平考试