【CCF推荐-C类】计算机学术会议截稿信息2条

中国计算机学会推荐国际学术会议和期刊目录自2010年8月首次发布以来,已历经五版,得到了计算机领域科研工作者的广泛关注。

目录共包含十个领域,分为ABC三类:A类是国际上极少数顶会与顶刊;B类代表领域内高水平的会议与期刊;C类指国际上重要的、为学术界所认可的优秀会议和期刊。

►►►

FMCAD 2024

FMCAD 2024 is the twenty-fourth in a series of conferences on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.

FMCAD was first held in 1996, and was a bi-annual conference until 2006, when the FMCAD and CHARME conferences merged into a single annual conference. Before merging, FMCAD was held in the United States on even years and its sister conference, CHARME, was held in Europe on odd years. Since 2006, the FMCAD conference has been held annually at various international venues.

所属领域:计算机科学理论

CCF分级:C类

时间地点:2024年10月14日-布拉格(捷克)

截稿时间:2024年4月28日

大会官网:https://fmcad.org/FMCAD24

大会征文

Model checking, theorem proving, equivalence checking, abstraction and reduction, compositional methods, decision procedures at the bit- and word-level, probabilistic methods, combinations of deductive methods and decision procedures.

Synthesis and compilation for computer system descriptions, modeling, specification, and implementation languages, formal semantics of languages and their subsets, model-based design, design derivation and transformation, correct-by-construction methods.

Application of formal and semi-formal methods to functional and non-functional specification and validation of hardware and software, including timing and power modeling, verification of computing systems on all levels of abstraction, system-level design and verification for embedded systems, cyber-physical systems, automotive systems and other safety-critical systems, hardware-software co-design and verification, and transaction-level verification.

Experience with the application of formal and semi-formal methods to industrial-scale designs; tools that represent formal verification enablement, new features, or a substantial improvement in the automation of formal methods.

Application of formal methods to verifying safety, connectivity and security properties of networks, distributed systems, smart contracts, block chains, and IoT devices.

Application of formal methods to the analysis of machine learning systems, and applications of machine learning to enhance formal methods techniques.

►►►

ICDF2C 2024

The International Conference on Digital Forensics and Cyber Crime will be held from October 9 -- 10, 2024, in Dubrovnik, Croatia.

This two-day event is expected to attract over 100 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The focus is on emerging topics including the use of Artificial Intelligence and Machine Learning in digital forensics as well as adversary engagement and threat intelligence for cyber security. In addition, we will have our traditional security and forensics topics of digital investigations, cyber security, behavioral cyber security, incident response, risk management, business, etc. Given below is an indicative list of possible topics.

所属领域:网络与信息安全

CCF分级:C类

时间地点:2024年10月9日-克罗地亚

截稿时间:2024年4月30日

大会官网:https://icdf2c.eai-conferences.org/2024

大会征文

The focus of the conference is on:

Cyber security

Digital forensics

Digital criminal investigations

Artificial intelligence and analytics for security and forensics

National intelligence

Topics include:

Digital forensics

Intrusion detection

Active defense

Cyber-physical system threats

Cyber warfare

AI/ML threats

Themes also include:

Text analysis

Cryptocurrencies

Hardware trojans

Topics include:

Digital and Multimedia Evidence and Forensics

Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts)

Chip Forensics

Mobile & Network Forensics

ICS/SCADA Forensics

Live Data Forensics

Forensic Lab Management and Accreditation

e-Discovery

相关推荐
得意霄尽欢11 分钟前
Redis之底层数据结构
数据结构·数据库·redis
hsjkdhs22 分钟前
MySQL 数据类型与运算符详解
数据库·mysql
zhao3266857511 小时前
海外代理IP平台Top3评测:LoongProxy、神龙动态IP、IPIPGO哪家更适合你?
服务器·网络·tcp/ip
云边云科技1 小时前
企业跨区域组网新解:SD-WAN技术打造安全稳定网络体系
运维·网络·人工智能·安全·边缘计算
pingao1413781 小时前
PG-210-HI 山洪预警系统呼叫端:筑牢山区应急预警 “安全防线”
大数据·人工智能·科技
Whoami!1 小时前
⸢ 肆-Ⅰ⸥ ⤳ 默认安全建设方案:c-1.增量风险管控
网络安全·信息安全·安全架构·风险控制
ZZHow10241 小时前
CTF-Web手的百宝箱
web安全·网络安全
XMZH030421 小时前
网络编程;TCP控制机械臂;UDP文件传输;0910;ps今天没写出来
网络·tcp/ip·udp
爱吃烤鸡翅的酸菜鱼2 小时前
【Redis】常用数据结构之Hash篇:从常用命令到使用场景详解
数据结构·数据库·redis·后端·缓存·哈希算法
李少兄2 小时前
IntelliJ IDEA 启动项目时配置端口指南
数据库·sql·intellij-idea