{"id":220311,"date":"2021-06-22T00:24:05","date_gmt":"2021-06-21T16:24:05","guid":{"rendered":"\/\/m.catawbaoil.com\/220311.html"},"modified":"2021-06-22T00:24:05","modified_gmt":"2021-06-21T16:24:05","slug":"%e4%bf%a1%e6%81%af%e5%ae%89%e5%85%a8%e4%b8%8e%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%9b%bd%e9%99%85%e7%a0%94%e8%ae%a8%e4%bc%9a-isns-2021_%e9%97%a8%e7%a5%a8%e4%bc%98%e6%83%a0_%e6%b4%bb%e5%8a%a8","status":"publish","type":"post","link":"\/\/m.catawbaoil.com\/220311.html","title":{"rendered":"\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168\u56fd\u9645\u7814\u8ba8\u4f1a (ISNS 2021)\u5728\u7ebf\u62a5\u540d"},"content":{"rendered":"\n
\u4f1a\u8bae\u5ef6\u671f\u901a\u77e5\uff1a \u4fe1\u606f\u5b89\u5168<\/a>\u4e0e\u7f51\u7edc\u5b89\u5168<\/a>\u56fd\u9645\u7814\u8ba8\u4f1a (ISNS 2021)<\/strong>\u5c06\u4e8e2021\u5e747\u670816-18\u65e5\u5728\u4e2d\u56fd\u6606\u660e\u4e3e\u884c\u3002ISNS 2020\u65e8\u5728\u4e3a\u4e1a\u5185\u4e13\u5bb6\u5b66\u8005\u5206\u4eab\u6280\u672f\u8fdb\u6b65\u548c\u4e1a\u52a1\u7ecf\u9a8c\uff0c\u805a\u7126\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168<\/strong>\u7b49<\/strong>\u76f8\u5173\u9886\u57df\u7684\u524d\u6cbf\u7814\u7a76\uff0c\u63d0\u4f9b\u4e00\u4e2a\u4ea4\u6d41\u7684\u5e73\u53f0\u3002\u672c\u5c4a\u5927\u4f1a\u5c06\u7ee7\u7eed\u9075\u5faa\u5b66\u672f\u6027\u3001\u56fd\u9645\u6027\u7684\u539f\u5219\uff0c\u7279\u9080\u56fd\u5185\u5916\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168\u7b49\u76f8\u5173\u9886\u57df\u5185\u7684\u5b66\u8005\u4e13\u5bb6\u524d\u6765\u53c2\u4f1a\uff0c\u5e76\u505a\u51fa\u7cbe\u5f69\u7684\u62a5\u544a\u3002<\/p>\n \u6e29\u99a8\u63d0\u793a\uff1a\u5927\u4f1a\u4e3a\u5b66\u672f\u4f1a\u8bae\uff0c\u5b98\u7f51\u8bed\u8a00\u662f\u82f1\u8bed\uff0c\u4e0d\u63d0\u4f9b\u540c\u4f20\u670d\u52a1\u3002\u8be6\u7ec6\u65e5\u7a0b\u8bf7\u8054\u7cfb\u5ba2\u670d\u83b7\u53d6\u3002<\/strong><\/span> \u00a0<\/p>\n \u8be5\u4f1a\u8bae\u5f81\u6587\u6d89\u53ca\u9886\u57df\u5305\u62ec\uff08\u4f46\u4e0d\u9650\u4e8e\uff09\uff1a<\/span><\/span><\/span><\/span><\/strong><\/p>\n Access Control\u00a0 Active Defense Systems<\/span><\/span><\/span><\/span><\/p>\n Adaptive Defense Systems<\/span><\/span><\/span><\/span><\/p>\n Analysis, Benchmark of Security Systems Complex Systems Security Distributed Systems Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n Data Protection High Performance Network Virtualization<\/span><\/span><\/span><\/span><\/p>\n High Performance Security Systems<\/span><\/span><\/span><\/span><\/p>\n Hardware Security Information Security Engineering\u00a0 Internet and Network Forensics<\/span><\/span><\/span><\/span><\/p>\n Intrusion Detection and Prevention Large-scale Attacks and Defense Security in Cloud and Grid Systems<\/span><\/span><\/span><\/span><\/p>\n Security in E-Commerce<\/span><\/span><\/span><\/span><\/p>\n Security in Pervasive\/Ubiquitous Computing<\/span><\/span><\/span><\/span><\/p>\n Security and Privacy in Smart Grid<\/span><\/span><\/span><\/span><\/p>\n Security and Privacy in Wireless Networks<\/span><\/span><\/span><\/span><\/p>\n Secure Mobile Agents and Mobile Code<\/span><\/span><\/span><\/span><\/p>\n Security Policy<\/span><\/span><\/span><\/span><\/p>\n Security Protocols<\/span><\/span><\/span><\/span><\/p>\n Security Simulation and Tools<\/span><\/span><\/span><\/span><\/p>\n Security Theory and Tools<\/span><\/span><\/span><\/span><\/p>\n Standards and Assurance Methods \u67e5\u770b\u66f4\u591a<\/p>\n \u67e5\u770b\u66f4\u591a<\/p>\n \u53c2\u4f1a\u8d39\u5305\u542b\u5185\u5bb9\uff1a <\/p>\n<\/p><\/div>\n \u67e5\u770b\u66f4\u591a<\/p>\n \u627e\u4f1a\u8bae\uff0c\u4e0a\u6d3b\u52a8\u5bb6\uff08https:\/\/www.huodongjia.com\/\uff09\uff01\u6d3b\u52a8\u5bb6\u662f\u4e9a\u6d32\u7684\u4f1a\u8bae\u6d3b\u52a8\u3001\u57f9\u8bad\u8ba4\u8bc1\u3001\u5546\u52a1\u6e38\u5b66\u8003\u5bdf\uff0c\u67e5\u8be2\u3001\u62a5\u540d\u3001\u7968\u52a1\u8425\u9500\u5e73\u53f0\uff0c\u81f4\u529b\u4e8e\u4e3a\u7528\u6237\u63d0\u4f9b\u6709\u4ef7\u503c\u3001\u6709\u610f\u4e49\u7684\u5546\u52a1\u4f1a\u8bae\u6d3b\u52a8\uff0c\u4ee5\u53ca\u4e3a\u4e3b\u529e\u65b9\u63d0\u4f9b\u4f1a\u8bae\u514d\u8d39\u53d1\u5e03\u3001\u6d3b\u52a8\u63a8\u5e7f\u8425\u9500\uff0c\u89c6\u9891\u76f4\u64ad\uff0c\u5728\u7ebf\u9009\u5ea7\u7b49\u670d\u52a1\uff0c\u662f\u4f60\u53c2\u4f1a\u3001\u529e\u4f1a\u7684\u597d\u52a9\u624b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":" \u4f1a\u8bae\u5ef6\u671f\u901a\u77e5\uff1a \u7531\u4e8e\u76ee\u524d\u56fd\u5185\u4e43\u81f3\u5168\u4e16\u754c\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u611f\u67d3\u80ba\u708e\u75ab\u60c5\u4ecd\u672a\u7ed3\u675f\uff0c\u4e16\u754c\u5404\u56fd\u4ecd\u7ef4\u6301\u975e\u5e38\u4e25\u683c\u7684\u7981\u6b62\u96c6\u4f1a\uff0c\u975e\u5fc5...<\/p>\n
\u7531\u4e8e\u76ee\u524d\u56fd\u5185\u4e43\u81f3\u5168\u4e16\u754c\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u611f\u67d3\u80ba\u708e\u75ab\u60c5\u4ecd\u672a\u7ed3\u675f\uff0c\u4e16\u754c\u5404\u56fd\u4ecd\u7ef4\u6301\u975e\u5e38\u4e25\u683c\u7684\u7981\u6b62\u96c6\u4f1a\uff0c\u975e\u5fc5\u8981\u4e0d\u5f97\u51fa\u5165\u5883\uff0c\u5fc5\u987b14\u5929\u9694\u79bb\u7684\u653f\u7b56\u3002\u540c\u65f6\u4e5f\u4e3a\u4e86\u5927\u5bb6\u7684\u8eab\u4f53\u548c\u751f\u547d\u5b89\u5168\uff0c\u79ef\u6781\u54cd\u5e94\u56fd\u5bb6\u201c\u4e0d\u51fa\u95e8\uff0c\u4e0d\u805a\u4f1a\u201d\u963b\u65ad\u548c\u9694\u79bb\u4f20\u67d3\u7684\u53f7\u53ec\uff0c\u6211\u4eec\u5c06\u63a8\u8fdf\u6b64\u6b21\u4f1a\u8bae\uff0c\u5ef6\u671f\u81f32021\u5e747\u670816-18\u65e5\u5728\u6606\u660e\u4e3e\u884c\u3002\u5982\u7ed9\u60a8\u9020\u6210\u4e0d\u4fbf\uff0c\u6211\u4eec\u975e\u5e38\u62b1\u6b49\uff0c\u671b\u8c05\u89e3\u3002<\/strong><\/span><\/p>\n
\u00a0<\/p>\n
Anti-Virus and Anti-Worms\u00a0
Authentication and Authorization\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Biometric Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Cryptography\u00a0
Data and System Integrity\u00a0
Database Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Electronic Commerce Security\u00a0
Fraud Control\u00a0
Grid Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Information Hiding and Watermarking\u00a0
Information Privacy\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Intellectual Property Protection\u00a0
Intrusion Detection\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Key Management and Key Recovery\u00a0
Language-based Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Network Security\u00a0
Risk Evaluation and Security Certification\u00a0
Security and Privacy for Social Computing\u00a0
Security Evaluation\u00a0
Security for Mobile Computing\u00a0
Security Models\u00a0
Security Protocols\u00a0
Signature and Key Agreement Protocol\u00a0
Software Security\u00a0
System Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n
Trusted Computing and Trustworthy Computing Technology<\/span><\/span><\/span><\/span><\/p>\n<\/p><\/div>\n\n\n
\n \u8be6\u7ec6\u7248\u65e5\u7a0b\u5c06\u5728\u4f1a\u524d\u4e00\u4e2a\u6708\u5de6\u53f3\u53d1\u5e03\uff0c\u5e76\u901a\u77e5\u6240\u6709\u4f5c\u8005\u3002\u7b80\u7248\u65e5\u7a0b\u5982\u4e0b\uff1a<\/td>\n<\/tr>\n \n <\/td>\n 7\u670816\u65e5<\/td>\n 7\u670817\u65e5<\/td>\n 7\u670818\u65e5<\/td>\n 7\u670819\u65e5<\/td>\n<\/tr>\n \n 8:30-10:00<\/td>\n <\/td>\n \u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n \u53e3\u5934\u62a5\u544a<\/td>\n \u4f1a\u540e\u4e00\u65e5\u6e38
(\u81ea\u8d39)<\/td>\n<\/tr>\n\n 10:00-10:20<\/td>\n \u8336\u6b47<\/td>\n \u8336\u6b47<\/td>\n<\/tr>\n \n 10:20-12:00<\/td>\n \u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n \u53e3\u5934\u62a5\u544a<\/td>\n<\/tr>\n \n 14:00-16:00<\/td>\n \u6ce8\u518c<\/td>\n \u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n <\/td>\n<\/tr>\n \n 16:00-16:20<\/td>\n \u8336\u6b47<\/td>\n <\/td>\n<\/tr>\n \n 16:20-18:00<\/td>\n \u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n <\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n \n\n
\n Package A:<\/td>\n \u00a0\u4ec5\u53c2\u4f1a\uff08\u65e0\u62a5\u544a\uff09\u00a0<\/td>\n \u00a0USD 400 (RMB 2400)\u00a0<\/td>\n<\/tr>\n \n Package B:<\/td>\n \u00a0\u53c2\u4f1a + \u6458\u8981\u62a5\u544a\u00a0<\/td>\n \u00a0USD 450 (RMB 2700)\u00a0<\/td>\n<\/tr>\n \n Package C:<\/td>\n \u00a0\u53c2\u4f1a + \u5168\u6587\u53d1\u8868 + \u62a5\u544a\u00a0<\/td>\n \u00a0USD 600 (RMB 3600)\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
1. \u53ef\u53c2\u52a0\u6240\u6709\u4f1a\u573a
2. \u4f1a\u8bae\u671f\u95f4\u5348\u9910\uff087\u670817,18\u65e5\uff09
3. \u4f1a\u8bae\u671f\u95f4\u665a\u9910\uff087\u670817\u65e5\u665a\uff09
4. \u4f1a\u8bae\u671f\u95f4\u8336\u6b47
5. \u4f1a\u8bae\u6307\u5357\u53ca\u4f1a\u8bae\u671f\u520a\u5404\u4e00\u672c\u00a0<\/p>\n