Welcome to NEIS2018!

The International Conference on Network Engineering and Information Security (NEIS2018)

April 20th - 22nd, 2018, Wuhan, China

The International Conference on Network Engineering and Information Security (NEIS2018)

April 20th - 22nd, 2018, Wuhan, China

Welcome to NEIS2018!

The International Conference on Network Engineering and Information Security [NEIS2018] is a leading annual conference of social science for all researchers home and abroad. Along with the exciting exhibition, NEIS2018 will be held in Wuhan, China,during April 20th-22nd, 2018. On behalf of the organizing committee, we'd like to send our honest invitation to all distinguished scholars and engineers.

With the rapid development of industry and information technology, researchers in all fields begin to discuss some new ideas connected with Network Engineering and Information Security. NEIS2018 will provide a valuable opportunity for researchers, scholars and some scientists to exchange their ideas face to face together. The conference attracts participants in a diverse range of fields, including Network Engineering, Information Security and some other related fields.

Apart from an interesting and stimulating program, there will be time to explore Wuhan: a beautiful, modern Chinese city that is both modern and steeped in history. As a typical garden city featuring mountains and waters, Wuhan is home to hundreds of hills and nearly 200 lakes of various sizes. With a water area making up 25.8% of its entire territory, Wuhan is ranked the first among major Chinese cities in water resources. East Lake, China's biggest downtown lake, covers an area of 33Km2.

The meeting time countdown 0 days

    • Submission Deadline

      April 19th, 2018

    • Conference Date

      April, 20th-22nd, 2018

Publication GuidelinesMORE++

√All submissions must be original, unpublished, and not submitted concurrently for publication elsewhere.
√All accepted paper by NEIS2018 will be published by DEStech Publications as a proceedings, and submitted to EI and CPCI for indexing
√Excellent papers will be selected and recommended from the proceedings to SCI or EI journals after the conference.

  • Submission Guidelines A
    – The construction of the papers should be complete, includes title, authors' information, abstract, keywords, introduction, body, conclusion and references mostly in late 5 years.
    – The official language of the papers will be English, other languages are not acceptable even in Figures or Tables.
    – Please provide reliable contact information in the email text, including address, telephone, email etc.
  • Submission Guidelines B
    – The papers should be original, unpublished or not submitted for publication elsewhere. Plagiarized articles will not be considered and the consequences will be responsible to author themselves.
    – The papers should be written in English, and not translated by translation software.
    – The suggested length of the papers will be 4 to 6 pages, if your paper exceeds 6 pages, there will be extra publication fees.


Keynote Speakers

  • Prof. Igor Kotenko
    SPIIRAS and ITMO University

    Igor V. Kotenko is a Head of Laboratory of computer security problems of St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS) and Head of the International Laboratory "Information security of cyber-physical systems" of St. Petersburg Institute ITMO University. He is Prof. of computer science, Doctor of Technical Sciences, PhD.

  • Prof. Seifedine Kadry
    Computing at Beirut Arab University

    Dr. Seifedine Kadry has a Bachelor degree in applied mathematics in 1999 from Lebanese University, MS degree in computation in 2002 from Reims University (France) and EPFL (Lausanne), PhD in Applied Mathematics in 2007 from Blaise Pascal University (France). At present his research focuses on system prognostics, stochastic systems, and probability and reliability analysis.

  • A.P. Evgeniya Ishchukova
    Southern Federal University

    Research Focus: Cryptography, Cryptanalysis, Symmetric Block Ciphers, Linear Cryptanalysis, Differential Cryptanalysis, Slide Attack, Parallel Computing.

Conference Photos

    Scroll to Top