posted by user: NSCLab || 1055 views || tracked by 3 users: [display]

NSS 2020 : 14th International Conference on Network and System Security


Conference Series : Network and System Security
When Nov 25, 2020 - Nov 27, 2020
Where Melbourne, Australia
Submission Deadline Aug 31, 2020
Categories    network and system security

Call For Papers

The 14th International Conference on Network and System Security (NSS2020) seeks submissions presenting novel contributions related to all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading-edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.
Since the first NSS held in Dalian 2007, NSS has been successfully held in: Sapporo, Japan (2019), Hong Kong, China (2018), Helsinki, Finland (2017), Taipei (2016), New York City, USA (2015), Xi'an, China (2014), Madrid, Spain (2013), Wu Yi Shan, China (2012), Milan, Italy (2011), Melbourne, Australia (2010), Gold Coast, Australia (2009), Shanghai, China (2008). After a decade, NSS is back in Melbourne. This year we have invited world-renowned security experts to deliver keynotes, such as Prof. Elisa Bertino, Prof. Robert Deng, Prof. Jaideep Vaidya, Prof Kui Ren, Prof Wanlei Zhou, and Prof. Xun Yi.

Topics of interest include but are not limited to:
• Active Defense Systems
• Ai/Machine Learning Security
• Analysis, Benchmark of Security Systems
• Applied Cryptography
• Authentication
• Big Data Trust, Security and Privacy
• Biometric Security
• Blockchain and Bitcoin Security
• Smart Contract
• Cyber Hacking and Protection
• Computer and network forensics
• Database and System Security
• Data and application security
• Decision Modelling and Optimization for
Security and Privacy Aspects
• Digital Forensics
• Facility Location and Network Design for
Securing the E-Society
• Game-theoretic Security Technologies
• Hardware Security
• High Performance Security Systems
• Implementation and Evaluation of Networked
Security Systems
• Information-theoretic Security
• Intelligent Defense Systems
• Internet and Network Forensics
• Intrusion Detection and Prevention
• Large-scale Attacks and Defense
• Location Privacy
• Network Resiliency
• Network Security
• Security Infrastructure
• Security Metrics and Models
• Security for Critical Infrastructures
• Security for Cyber Physical Systems
• Security for Software-defined and Data Center Networks
• Security in Cloud and Grid Systems
• Security and Privacy for Digital Health
• Security and Privacy in Smart Cities, Smart and
Connected Health, IoT, and RFID Systems
• Security and Privacy in Social Networks
• Security and Privacy in Wireless Networks
• Secure Mobile Agents and Mobile Code
• Security Policy
• Security Protocols
• Software Security
• Security Theory and Tools
• Security, Trust and Privacy in Crowdsourcing,
Crowdsensing and CrowdPayment
• Security, Trust and Privacy in Internet of Things
• Trusted Computing
• Trust Management
• Viruses and Malware
• Watermarking and Digital Rights Management
• Web, E-commerce, M-commerce, and E-mail Security
• World Wide Web Security

Paper Submission Information:
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.

Related Resources

NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE-CISNS 2021   2021 2nd International Conference on Information System and Network Security (CISNS 2021)
ICISPP--Ei, Scopus 2022   2022 3rd International Conference on Information Security and Privacy Protection (ICISPP 2022)--Ei Compendex, Scopus
ICAIT--Ei Compendex, Scopus 2022   2022 The 14th International Conference on Advanced Infocomm Technology (ICAIT 2022)--Ei Compendex, SCOPUS
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
CoMSE 2022   2022 International Conference on Materials Science and Engineering (CoMSE 2022)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)