{"id":220311,"date":"2021-06-22T00:24:05","date_gmt":"2021-06-21T16:24:05","guid":{"rendered":"\/\/m.catawbaoil.com\/220311.html"},"modified":"2021-06-22T00:24:05","modified_gmt":"2021-06-21T16:24:05","slug":"%e4%bf%a1%e6%81%af%e5%ae%89%e5%85%a8%e4%b8%8e%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e5%9b%bd%e9%99%85%e7%a0%94%e8%ae%a8%e4%bc%9a-isns-2021_%e9%97%a8%e7%a5%a8%e4%bc%98%e6%83%a0_%e6%b4%bb%e5%8a%a8","status":"publish","type":"post","link":"\/\/m.catawbaoil.com\/220311.html","title":{"rendered":"\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168\u56fd\u9645\u7814\u8ba8\u4f1a (ISNS 2021)\u5728\u7ebf\u62a5\u540d"},"content":{"rendered":"\n
\n

\u4f1a\u8bae\u5ef6\u671f\u901a\u77e5\uff1a
\u7531\u4e8e\u76ee\u524d\u56fd\u5185\u4e43\u81f3\u5168\u4e16\u754c\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u611f\u67d3\u80ba\u708e\u75ab\u60c5\u4ecd\u672a\u7ed3\u675f\uff0c\u4e16\u754c\u5404\u56fd\u4ecd\u7ef4\u6301\u975e\u5e38\u4e25\u683c\u7684\u7981\u6b62\u96c6\u4f1a\uff0c\u975e\u5fc5\u8981\u4e0d\u5f97\u51fa\u5165\u5883\uff0c\u5fc5\u987b14\u5929\u9694\u79bb\u7684\u653f\u7b56\u3002\u540c\u65f6\u4e5f\u4e3a\u4e86\u5927\u5bb6\u7684\u8eab\u4f53\u548c\u751f\u547d\u5b89\u5168\uff0c\u79ef\u6781\u54cd\u5e94\u56fd\u5bb6\u201c\u4e0d\u51fa\u95e8\uff0c\u4e0d\u805a\u4f1a\u201d\u963b\u65ad\u548c\u9694\u79bb\u4f20\u67d3\u7684\u53f7\u53ec\uff0c\u6211\u4eec\u5c06\u63a8\u8fdf\u6b64\u6b21\u4f1a\u8bae\uff0c\u5ef6\u671f\u81f32021\u5e747\u670816-18\u65e5\u5728\u6606\u660e\u4e3e\u884c\u3002\u5982\u7ed9\u60a8\u9020\u6210\u4e0d\u4fbf\uff0c\u6211\u4eec\u975e\u5e38\u62b1\u6b49\uff0c\u671b\u8c05\u89e3\u3002<\/strong><\/span><\/p>\n

\u4fe1\u606f\u5b89\u5168<\/a>\u4e0e\u7f51\u7edc\u5b89\u5168<\/a>\u56fd\u9645\u7814\u8ba8\u4f1a (ISNS 2021)<\/strong>\u5c06\u4e8e2021\u5e747\u670816-18\u65e5\u5728\u4e2d\u56fd\u6606\u660e\u4e3e\u884c\u3002ISNS 2020\u65e8\u5728\u4e3a\u4e1a\u5185\u4e13\u5bb6\u5b66\u8005\u5206\u4eab\u6280\u672f\u8fdb\u6b65\u548c\u4e1a\u52a1\u7ecf\u9a8c\uff0c\u805a\u7126\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168<\/strong>\u7b49<\/strong>\u76f8\u5173\u9886\u57df\u7684\u524d\u6cbf\u7814\u7a76\uff0c\u63d0\u4f9b\u4e00\u4e2a\u4ea4\u6d41\u7684\u5e73\u53f0\u3002\u672c\u5c4a\u5927\u4f1a\u5c06\u7ee7\u7eed\u9075\u5faa\u5b66\u672f\u6027\u3001\u56fd\u9645\u6027\u7684\u539f\u5219\uff0c\u7279\u9080\u56fd\u5185\u5916\u4fe1\u606f\u5b89\u5168\u4e0e\u7f51\u7edc\u5b89\u5168\u7b49\u76f8\u5173\u9886\u57df\u5185\u7684\u5b66\u8005\u4e13\u5bb6\u524d\u6765\u53c2\u4f1a\uff0c\u5e76\u505a\u51fa\u7cbe\u5f69\u7684\u62a5\u544a\u3002<\/p>\n

\u6e29\u99a8\u63d0\u793a\uff1a\u5927\u4f1a\u4e3a\u5b66\u672f\u4f1a\u8bae\uff0c\u5b98\u7f51\u8bed\u8a00\u662f\u82f1\u8bed\uff0c\u4e0d\u63d0\u4f9b\u540c\u4f20\u670d\u52a1\u3002\u8be6\u7ec6\u65e5\u7a0b\u8bf7\u8054\u7cfb\u5ba2\u670d\u83b7\u53d6\u3002<\/strong><\/span>
\u00a0<\/p>\n

\u00a0<\/p>\n

\u8be5\u4f1a\u8bae\u5f81\u6587\u6d89\u53ca\u9886\u57df\u5305\u62ec\uff08\u4f46\u4e0d\u9650\u4e8e\uff09\uff1a<\/span><\/span><\/span><\/span><\/strong><\/p>\n

Access Control\u00a0
Anti-Virus and Anti-Worms\u00a0
Authentication and Authorization\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Active Defense Systems<\/span><\/span><\/span><\/span><\/p>\n

Adaptive Defense Systems<\/span><\/span><\/span><\/span><\/p>\n

Analysis, Benchmark of Security Systems
Biometric Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Complex Systems Security
Cryptography\u00a0
Data and System Integrity\u00a0
Database Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Distributed Systems Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Data Protection
Electronic Commerce Security\u00a0
Fraud Control\u00a0
Grid Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

High Performance Network Virtualization<\/span><\/span><\/span><\/span><\/p>\n

High Performance Security Systems<\/span><\/span><\/span><\/span><\/p>\n

Hardware Security
Information Hiding and Watermarking\u00a0
Information Privacy\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Information Security Engineering\u00a0
Intellectual Property Protection\u00a0
Intrusion Detection\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Internet and Network Forensics<\/span><\/span><\/span><\/span><\/p>\n

Intrusion Detection and Prevention
Key Management and Key Recovery\u00a0
Language-based Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Large-scale Attacks and Defense
Network Security\u00a0
Risk Evaluation and Security Certification\u00a0
Security and Privacy for Social Computing\u00a0
Security Evaluation\u00a0
Security for Mobile Computing\u00a0
Security Models\u00a0
Security Protocols\u00a0
Signature and Key Agreement Protocol\u00a0
Software Security\u00a0
System Security\u00a0<\/span><\/span><\/span><\/span><\/p>\n

Security in Cloud and Grid Systems<\/span><\/span><\/span><\/span><\/p>\n

Security in E-Commerce<\/span><\/span><\/span><\/span><\/p>\n

Security in Pervasive\/Ubiquitous Computing<\/span><\/span><\/span><\/span><\/p>\n

Security and Privacy in Smart Grid<\/span><\/span><\/span><\/span><\/p>\n

Security and Privacy in Wireless Networks<\/span><\/span><\/span><\/span><\/p>\n

Secure Mobile Agents and Mobile Code<\/span><\/span><\/span><\/span><\/p>\n

Security Policy<\/span><\/span><\/span><\/span><\/p>\n

Security Protocols<\/span><\/span><\/span><\/span><\/p>\n

Security Simulation and Tools<\/span><\/span><\/span><\/span><\/p>\n

Security Theory and Tools<\/span><\/span><\/span><\/span><\/p>\n

Standards and Assurance Methods
Trusted Computing and Trustworthy Computing Technology<\/span><\/span><\/span><\/span><\/p>\n<\/p><\/div>\n

\u67e5\u770b\u66f4\u591a<\/p>\n

\n\n\n\n\n\n\n\n\n\n\n
\u8be6\u7ec6\u7248\u65e5\u7a0b\u5c06\u5728\u4f1a\u524d\u4e00\u4e2a\u6708\u5de6\u53f3\u53d1\u5e03\uff0c\u5e76\u901a\u77e5\u6240\u6709\u4f5c\u8005\u3002\u7b80\u7248\u65e5\u7a0b\u5982\u4e0b\uff1a<\/td>\n<\/tr>\n
<\/td>\n7\u670816\u65e5<\/td>\n7\u670817\u65e5<\/td>\n7\u670818\u65e5<\/td>\n7\u670819\u65e5<\/td>\n<\/tr>\n
8:30-10:00<\/td>\n<\/td>\n\u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n\u53e3\u5934\u62a5\u544a<\/td>\n\u4f1a\u540e\u4e00\u65e5\u6e38
(\u81ea\u8d39)<\/td>\n<\/tr>\n
10:00-10:20<\/td>\n\u8336\u6b47<\/td>\n\u8336\u6b47<\/td>\n<\/tr>\n
10:20-12:00<\/td>\n\u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n\u53e3\u5934\u62a5\u544a<\/td>\n<\/tr>\n
14:00-16:00<\/td>\n\u6ce8\u518c<\/td>\n\u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n<\/td>\n<\/tr>\n
16:00-16:20<\/td>\n\u8336\u6b47<\/td>\n<\/td>\n<\/tr>\n
16:20-18:00<\/td>\n\u7279\u9080\u4e13\u5bb6\u62a5\u544a<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n

\u67e5\u770b\u66f4\u591a<\/p>\n

\n\n\n\n\n\n
Package A:<\/td>\n\u00a0\u4ec5\u53c2\u4f1a\uff08\u65e0\u62a5\u544a\uff09\u00a0<\/td>\n\u00a0USD 400 (RMB 2400)\u00a0<\/td>\n<\/tr>\n
Package B:<\/td>\n\u00a0\u53c2\u4f1a + \u6458\u8981\u62a5\u544a\u00a0<\/td>\n\u00a0USD 450 (RMB 2700)\u00a0<\/td>\n<\/tr>\n
Package C:<\/td>\n\u00a0\u53c2\u4f1a + \u5168\u6587\u53d1\u8868 + \u62a5\u544a\u00a0<\/td>\n\u00a0USD 600 (RMB 3600)\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

\u53c2\u4f1a\u8d39\u5305\u542b\u5185\u5bb9\uff1a
1. \u53ef\u53c2\u52a0\u6240\u6709\u4f1a\u573a
2. \u4f1a\u8bae\u671f\u95f4\u5348\u9910\uff087\u670817,18\u65e5\uff09
3. \u4f1a\u8bae\u671f\u95f4\u665a\u9910\uff087\u670817\u65e5\u665a\uff09
4. \u4f1a\u8bae\u671f\u95f4\u8336\u6b47
5. \u4f1a\u8bae\u6307\u5357\u53ca\u4f1a\u8bae\u671f\u520a\u5404\u4e00\u672c\u00a0<\/p>\n

<\/p>\n<\/p><\/div>\n

\u67e5\u770b\u66f4\u591a<\/p>\n

\u627e\u4f1a\u8bae\uff0c\u4e0a\u6d3b\u52a8\u5bb6\uff08https:\/\/www.huodongjia.com\/\uff09\uff01\u6d3b\u52a8\u5bb6\u662f\u4e9a\u6d32\u7684\u4f1a\u8bae\u6d3b\u52a8\u3001\u57f9\u8bad\u8ba4\u8bc1\u3001\u5546\u52a1\u6e38\u5b66\u8003\u5bdf\uff0c\u67e5\u8be2\u3001\u62a5\u540d\u3001\u7968\u52a1\u8425\u9500\u5e73\u53f0\uff0c\u81f4\u529b\u4e8e\u4e3a\u7528\u6237\u63d0\u4f9b\u6709\u4ef7\u503c\u3001\u6709\u610f\u4e49\u7684\u5546\u52a1\u4f1a\u8bae\u6d3b\u52a8\uff0c\u4ee5\u53ca\u4e3a\u4e3b\u529e\u65b9\u63d0\u4f9b\u4f1a\u8bae\u514d\u8d39\u53d1\u5e03\u3001\u6d3b\u52a8\u63a8\u5e7f\u8425\u9500\uff0c\u89c6\u9891\u76f4\u64ad\uff0c\u5728\u7ebf\u9009\u5ea7\u7b49\u670d\u52a1\uff0c\u662f\u4f60\u53c2\u4f1a\u3001\u529e\u4f1a\u7684\u597d\u52a9\u624b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

\u4f1a\u8bae\u5ef6\u671f\u901a\u77e5\uff1a \u7531\u4e8e\u76ee\u524d\u56fd\u5185\u4e43\u81f3\u5168\u4e16\u754c\u65b0\u578b\u51a0\u72b6\u75c5\u6bd2\u611f\u67d3\u80ba\u708e\u75ab\u60c5\u4ecd\u672a\u7ed3\u675f\uff0c\u4e16\u754c\u5404\u56fd\u4ecd\u7ef4\u6301\u975e\u5e38\u4e25\u683c\u7684\u7981\u6b62\u96c6\u4f1a\uff0c\u975e\u5fc5...<\/p>\n