【CCF推荐-C类】计算机学术会议截稿信息2条

中国计算机学会推荐国际学术会议和期刊目录自2010年8月首次发布以来,已历经五版,得到了计算机领域科研工作者的广泛关注。

目录共包含十个领域,分为ABC三类:A类是国际上极少数顶会与顶刊;B类代表领域内高水平的会议与期刊;C类指国际上重要的、为学术界所认可的优秀会议和期刊。

►►►

FMCAD 2024

FMCAD 2024 is the twenty-fourth in a series of conferences on the theory and applications of formal methods in hardware and system verification. FMCAD provides a leading forum to researchers in academia and industry for presenting and discussing groundbreaking methods, technologies, theoretical results, and tools for reasoning formally about computing systems. FMCAD covers formal aspects of computer-aided system design including verification, specification, synthesis, and testing.

FMCAD was first held in 1996, and was a bi-annual conference until 2006, when the FMCAD and CHARME conferences merged into a single annual conference. Before merging, FMCAD was held in the United States on even years and its sister conference, CHARME, was held in Europe on odd years. Since 2006, the FMCAD conference has been held annually at various international venues.

所属领域:计算机科学理论

CCF分级:C类

时间地点:2024年10月14日-布拉格(捷克)

截稿时间:2024年4月28日

大会官网:https://fmcad.org/FMCAD24

大会征文

Model checking, theorem proving, equivalence checking, abstraction and reduction, compositional methods, decision procedures at the bit- and word-level, probabilistic methods, combinations of deductive methods and decision procedures.

Synthesis and compilation for computer system descriptions, modeling, specification, and implementation languages, formal semantics of languages and their subsets, model-based design, design derivation and transformation, correct-by-construction methods.

Application of formal and semi-formal methods to functional and non-functional specification and validation of hardware and software, including timing and power modeling, verification of computing systems on all levels of abstraction, system-level design and verification for embedded systems, cyber-physical systems, automotive systems and other safety-critical systems, hardware-software co-design and verification, and transaction-level verification.

Experience with the application of formal and semi-formal methods to industrial-scale designs; tools that represent formal verification enablement, new features, or a substantial improvement in the automation of formal methods.

Application of formal methods to verifying safety, connectivity and security properties of networks, distributed systems, smart contracts, block chains, and IoT devices.

Application of formal methods to the analysis of machine learning systems, and applications of machine learning to enhance formal methods techniques.

►►►

ICDF2C 2024

The International Conference on Digital Forensics and Cyber Crime will be held from October 9 -- 10, 2024, in Dubrovnik, Croatia.

This two-day event is expected to attract over 100 participants including academics, practitioners, and vendors providing opportunities for business and intellectual engagement among attendees. The focus is on emerging topics including the use of Artificial Intelligence and Machine Learning in digital forensics as well as adversary engagement and threat intelligence for cyber security. In addition, we will have our traditional security and forensics topics of digital investigations, cyber security, behavioral cyber security, incident response, risk management, business, etc. Given below is an indicative list of possible topics.

所属领域:网络与信息安全

CCF分级:C类

时间地点:2024年10月9日-克罗地亚

截稿时间:2024年4月30日

大会官网:https://icdf2c.eai-conferences.org/2024

大会征文

The focus of the conference is on:

Cyber security

Digital forensics

Digital criminal investigations

Artificial intelligence and analytics for security and forensics

National intelligence

Topics include:

Digital forensics

Intrusion detection

Active defense

Cyber-physical system threats

Cyber warfare

AI/ML threats

Themes also include:

Text analysis

Cryptocurrencies

Hardware trojans

Topics include:

Digital and Multimedia Evidence and Forensics

Multimedia Forensics (including but not limited to Image-, Audio-, and Video Analysis, Biometrics, Linguistic Analysis of Texts)

Chip Forensics

Mobile & Network Forensics

ICS/SCADA Forensics

Live Data Forensics

Forensic Lab Management and Accreditation

e-Discovery

相关推荐
好奇的菜鸟1 小时前
如何在IntelliJ IDEA中设置数据库连接全局共享
java·数据库·intellij-idea
tan180°1 小时前
MySQL表的操作(3)
linux·数据库·c++·vscode·后端·mysql
人机与认知实验室1 小时前
艺术与科技的具身、离身、反身
科技
Hello.Reader3 小时前
Redis 延迟排查与优化全攻略
数据库·redis·缓存
简佐义的博客3 小时前
破解非模式物种GO/KEGG注释难题
开发语言·数据库·后端·oracle·golang
爬山算法3 小时前
MySQL(116)如何监控负载均衡状态?
数据库·mysql·负载均衡
独行soc4 小时前
#渗透测试#批量漏洞挖掘#HSC Mailinspector 任意文件读取漏洞(CVE-2024-34470)
linux·科技·安全·网络安全·面试·渗透测试
Me4神秘6 小时前
电信、移动、联通、广电跨运营商网速慢原因
网络
老纪的技术唠嗑局6 小时前
OceanBase PoC 经验总结(二)—— AP 业务
数据库
-qOVOp-6 小时前
408第三季part2 - 计算机网络 - ip分布首部格式与分片
网络协议·tcp/ip·计算机网络