posted by user: NSCLab || 1725 views || tracked by 3 users: [display]

NSS 2020 : 14th International Conference on Network and System Security


Conference Series : Network and System Security
When Nov 25, 2020 - Nov 27, 2020
Where Melbourne, Australia
Submission Deadline Aug 31, 2020
Categories    network and system security

Call For Papers

The 14th International Conference on Network and System Security (NSS2020) seeks submissions presenting novel contributions related to all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading-edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.
Since the first NSS held in Dalian 2007, NSS has been successfully held in: Sapporo, Japan (2019), Hong Kong, China (2018), Helsinki, Finland (2017), Taipei (2016), New York City, USA (2015), Xi'an, China (2014), Madrid, Spain (2013), Wu Yi Shan, China (2012), Milan, Italy (2011), Melbourne, Australia (2010), Gold Coast, Australia (2009), Shanghai, China (2008). After a decade, NSS is back in Melbourne. This year we have invited world-renowned security experts to deliver keynotes, such as Prof. Elisa Bertino, Prof. Robert Deng, Prof. Jaideep Vaidya, Prof Kui Ren, Prof Wanlei Zhou, and Prof. Xun Yi.

Topics of interest include but are not limited to:
• Active Defense Systems
• Ai/Machine Learning Security
• Analysis, Benchmark of Security Systems
• Applied Cryptography
• Authentication
• Big Data Trust, Security and Privacy
• Biometric Security
• Blockchain and Bitcoin Security
• Smart Contract
• Cyber Hacking and Protection
• Computer and network forensics
• Database and System Security
• Data and application security
• Decision Modelling and Optimization for
Security and Privacy Aspects
• Digital Forensics
• Facility Location and Network Design for
Securing the E-Society
• Game-theoretic Security Technologies
• Hardware Security
• High Performance Security Systems
• Implementation and Evaluation of Networked
Security Systems
• Information-theoretic Security
• Intelligent Defense Systems
• Internet and Network Forensics
• Intrusion Detection and Prevention
• Large-scale Attacks and Defense
• Location Privacy
• Network Resiliency
• Network Security
• Security Infrastructure
• Security Metrics and Models
• Security for Critical Infrastructures
• Security for Cyber Physical Systems
• Security for Software-defined and Data Center Networks
• Security in Cloud and Grid Systems
• Security and Privacy for Digital Health
• Security and Privacy in Smart Cities, Smart and
Connected Health, IoT, and RFID Systems
• Security and Privacy in Social Networks
• Security and Privacy in Wireless Networks
• Secure Mobile Agents and Mobile Code
• Security Policy
• Security Protocols
• Software Security
• Security Theory and Tools
• Security, Trust and Privacy in Crowdsourcing,
Crowdsensing and CrowdPayment
• Security, Trust and Privacy in Internet of Things
• Trusted Computing
• Trust Management
• Viruses and Malware
• Watermarking and Digital Rights Management
• Web, E-commerce, M-commerce, and E-mail Security
• World Wide Web Security

Paper Submission Information:
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline.

Related Resources

CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
Ei/Scopus-CACEE 2024   2024 2nd International Conference on Automation, Control and Electronics Engineering (CACEE 2024) -Ei Compendex
ACC6G 2025   2025 Asia Conference on Communications and 6G (ACC6G 2025)
NSysS - 2024   11th International Conference on Networking, Systems, and Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
SPIE-Ei/Scopus-CCRIS 2024   2024 5th International Conference on Control, Robotics and Intelligent System (CCRIS 2024) -EI Compendex