{"id":171,"date":"2021-07-11T06:37:11","date_gmt":"2021-07-11T06:37:11","guid":{"rendered":"https:\/\/ncs2021.esam.io\/?page_id=171"},"modified":"2021-08-15T06:29:43","modified_gmt":"2021-08-15T06:29:43","slug":"index","status":"publish","type":"page","link":"https:\/\/ncs2021.esam.io\/","title":{"rendered":"\u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168"},"content":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_last_edited=”off|desktop” admin_label=”Hero” _builder_version=”3.22″ use_background_color_gradient=”on” background_color_gradient_start=”#ffffff” background_color_gradient_end=”#e7edf9″ custom_margin=”|||” custom_padding=”100px||100px|” custom_padding_tablet=”130px||130px|”][et_pb_row admin_label=”title and illustration” _builder_version=”4.7.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”|||”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ header_font=”Merriweather|700|||||||” header_font_size=”46px” header_line_height=”1.3em” custom_margin=”||0px|” animation_style=”flip” animation_direction=”top”]<\/p>\n

NCS 2021<\/h1>\n

WORKSHOP PROGRAM -\u300c\u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168\u300d<\/h1>\n

[\/et_pb_text][et_pb_divider color=”#4646c4″ divider_position=”center” divider_weight=”2px” _builder_version=”3.2″ max_width=”90px” max_width_tablet=”12%” max_width_last_edited=”off|desktop” custom_margin=”|||” animation_style=”flip” animation_delay=”50ms”][\/et_pb_divider][et_pb_text _builder_version=”4.7.4″ text_font=”||||on||||” text_text_color=”#0C71C3″ text_font_size=”20px” text_line_height=”1.8em” custom_margin=”25px|||” animation_style=”flip” animation_direction=”top” animation_delay=”100ms” link_option_url=”https:\/\/tanet2021.thu.edu.tw\/” link_option_url_new_window=”on”]2021\u5e74\u81fa\u7063\u7db2\u969b\u7db2\u8def\u7814\u8a0e\u6703 (TANET) \u66a8\u5168\u570b\u8a08\u7b97\u6a5f\u6703\u8b70 (NCS)[\/et_pb_text][et_pb_button button_url=”https:\/\/www.esam.io\/” url_new_window=”on” button_text=”\u524d\u5f80 ESAM \u9996\u9801” _builder_version=”4.7.4″ _module_preset=”default” custom_button=”on” button_text_color=”#0C71C3″][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Speakers” _builder_version=”3.22″ width=”100%” custom_padding=”90px||90px|” animation_style=”zoom” animation_intensity_zoom=”10%”][et_pb_row column_structure=”1_3,2_3″ _builder_version=”3.25″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https:\/\/ncs2021.esam.io\/wp-content\/uploads\/2021\/07\/\u6771\u6d77\u5927\u5b78.jpg” title_text=”\u6771\u6d77\u5927\u5b78” _builder_version=”4.7.4″ custom_margin=”|||” custom_margin_tablet=”90px|||” custom_margin_last_edited=”off|desktop” always_center_on_mobile=”off” locked=”off”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

\u8209\u884c\u6642\u9593\u8207\u5730\u9ede<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em”]<\/p>\n

\u65e5\u671f : 110<\/span>\u5e74<\/span>12<\/span>\u6708<\/span>10-12<\/span>\u65e5\u00a0<\/span>\u661f\u671f\u4e94-\u661f\u671f\u65e5<\/span><\/h1>\n

<\/span><\/p>\n

<\/span><\/p>\n

\u5730\u9ede : \u6771\u6d77\u5927\u5b78\u8209\u884c<\/span><\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Aim and Scope<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

\u5728\u8cc7\u8a0a\u76f8\u95dc\u9818\u57df\u6709\u60a0\u4e45\u7684\u6b77\u53f2\uff0c\u4eab\u6709\u76db\u540d\u5169\u5e74\u4e00\u6b21\u7684\u5168\u570b\u8a08\u7b97\u6a5f\u6703\u8b70 (National Computer Symposium, NCS for a short) \u5c0d\u65bc\u63d0\u5347\u6211\u570b\u5b78\u8853\u767c\u5c55\u8207\u8a08\u7b97\u6a5f\u7522\u696d\u63a8\u5c55\u6709\u76f8\u7576\u5927\u7684\u52a9\u76ca\u3002\u6b77\u5c46\u6703\u8b70\u532f\u805a\u4e86\u5168\u570b\u5404\u9818\u57df\u7684\u83c1\u82f1\uff0c\u5c07\u8a31\u591a\u5091\u51fa\u7684\u6210\u679c\u5728\u5927\u6703\u4e0a\u767c\u8868\uff0c\u540c\u6642\u4f86\u81ea\u570b\u5167\u5916\u7684\u5c08\u5bb6\u5b78\u8005\u9032\u884c\u5fc3\u5f97\u5206\u4eab\u8207\u610f\u898b\u4ea4\u63db\uff0c\u4fc3\u6210\u7522\u5b98\u5b78\u5404\u754c\u4e4b\u4ea4\u6d41\uff0c\u4e5f\u8b93\u7814\u7a76\u6c34\u6e96\u5f97\u4ee5\u63d0\u5347\u3002\u56e0\u6b64\uff0cNCS \u5df2\u6210\u70ba\u570b\u5167\u8a08\u7b97\u6a5f\u7814\u7a76\u8207\u61c9\u7528\u4e4b\u91cd\u5927\u6307\u6a19\u578b\u6703\u8b70\u3002<\/h4>\n

Computer and Internet crimes are on the rise due to the fast paced development of computer and Internet technology and the techniques to combat these crimes are required more and more on a daily basis. Therefore, with the focus on subjects related to information security, Internet communications and electronic business security become very essential.<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

2021 Workshop on E-SECURITY in FORENSICS, MEDICAL, and COMPUTING SERVICES AND APPLICATIONS
(\u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168)<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

Intends to provide a forum for researchers, educators, and professionals to exchange their discoveries, practices and cutting-edge research achievements covering those aspects of security with the forensics, medical concerns, computing services and applications. The workshop also explores future trends and applications in these areas and other related areas. Your Participation at the workshop would be an excellent opportunity for you to meet other researchers and to discuss the technology advancements. The 2021 National Computer Symposium (NCS 2021) will be held on DEC. 10-12, 2021 @ Tunghai University (\u6771\u6d77\u5927\u5b78) TAIWAN<\/a><\/span>.<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Topic of Interests<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

Areas of interest include, but are not limited to, the following topics:
\n* Digital forensics surveillance technology and procedure
\n* Authentication and privacy in security
\n* Medical protection systems
\n* Network attack and defense program studies
\n* Information leakage in conglomerate
\n* Information hiding, malicious code, and steganography
\n* Attack and cryptanalysis in network systems
\n* Copyright protections and personal privacy
\n* Mobile service and security in applications
\n* Technology law related privacy and protection
\n* Personal privacy and medical security in internet applications
\n* Phishing and online fraud preventions
\n* Applied\/commercial cryptography
\n* Commercial cryptographic applications
\n* Information Law with personal privacy
\n* Custody of evidence chain in networking systems
\n* Security and privacy in wireless communications
\n* Integrity of digital evidence and live investigations
\n* Incident response and investigation in communications
\n* Location privacy and authentication in vehicle systems
\n* Vehicular ad-hoc network (VANET) security
\n* Security and privacy in ubiquitous computing and context-aware applications
\n* Forensic analysis and tracing traitors
\n* RFID applications and security countermeasures
\n* Cyberstalking investigations in network activities
\n* Web services\/XML forensics
\n* Computer and network security and applications
\n* Formal methods in network forensic computing
\n* Legal, ethical and policy issues in network forensics
\n* Social networking forensics
\n* Cloud forensics
\n* Network forensics case studies
\n* Data mining for evidence trace in networks
\n* Multimedia analysis for forensics
\n* Communication protocols in network forensics
\n* Network forensics
\n* Fraud detection
\n* Cloud computing security
\n<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Journal Publication Recommendations<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop”]<\/p>\n

International Journal of Network Security (EI)
Journal of Information Hiding and Multimedia Signal Processing (EI)
Sensors (SCIE)
Journal of Supercomputing (SCI)
Journal of Information, Technology, and Society
Information Sciences (SCI)
Journal of Chung Cheng Institute of Technology (\u4e2d\u6b63\u5dba\u5b78\u5831) (EI)
IEEE Access (SCI)
Symmetry (SCIE)
Computer Modeling in Engineering & Sciences (SCIE)<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.7.4″ custom_margin=”|||” custom_padding=”40px|0px|40px|0px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_text_color=”#7e7f93″ text_font_size=”18px” header_font=”||||||||” header_3_font=”Merriweather|700|||||||” header_3_text_color=”#4646c4″ header_3_font_size=”36px” header_3_line_height=”1.4em” locked=”off”]<\/p>\n

Important Dates<\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.7.4″ text_font=”||||||||” text_font_size=”18px” text_line_height=”1.8em” header_line_height=”2.9em” header_4_font_size=”25px” header_4_line_height=”1.5em” hover_enabled=”0″ header_line_height_tablet=”” header_line_height_phone=”” header_line_height_last_edited=”on|desktop” sticky_enabled=”0″]<\/p>\n

09\u670817\u65e5 \u622a\u6b62\u8ad6\u6587\u6295\u7a3f AT \u6295\u7a3f\u7cfb\u7d71\u00a0<\/a><\/p>\n

\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u4e26\u9078\u9805 NCS \u5c08\u9580\u7814\u8a0e\u6703 Workshop ***\u6578\u4f4d\u9451\u8b58\u3001\u91ab\u7642\u79c1\u5bc6\u8207\u7db2\u99ed\u5b89\u5168<\/p>\n

10\u670815\u65e5 \u63a5\u53d7\u8ad6\u6587\u901a\u77e5<\/p>\n

10\u670829\u65e5 \u622a\u6b62\u7e73\u4ea4\u8ad6\u6587\u5b8c\u7a3f<\/p>\n

10\u670818\u65e5 \u7814\u8a0e\u6703\u5831\u540d\u958b\u59cb<\/p>\n

11\u670812\u65e5 \u7814\u8a0e\u6703\u5831\u540d\u622a\u6b62<\/p>\n

12\u670810-12\u65e5 NCS 2021 \u6b63\u5f0f\u9032\u884c<\/p>\n

<\/h4>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_ […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/pages\/171"}],"collection":[{"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":9,"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/pages\/171\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/pages\/171\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/ncs2021.esam.io\/wp-json\/wp\/v2\/media?parent=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}