| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Present CFP : 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Areas of interest for NSS 2024 include but are not limited to:
Intrusion Detection and Prevention Network Infrastructure Security NFV/SDN Security Network Attacks and Defenses Secure Networked Systems Distributed Systems Security Cloud Security Mobile Security Malware/Ransomware Analysis and Detection Digital Forensics Analysis of Network Security Protocols Program and Binary Analysis Formal Verification for Network Systems and Protocols Fuzzy Testing Privacy-enhancing Techniques and Anonymity Cryptographic Protocols with Networks and Systems Blockchain Protocols and Systems Smart Contract Security Blockchain Powered Applications and Services Trustworthy Machine Learning and AI Privacy-preserving Machine Learning Federated Learning Protocols and Systems Hardware Security Cyber-Physical Systems Security Internet of Things Security Side-Channel Attacks and Countermeasures Confidential Computing and Its Applications Watermarking and Digital Rights Management Security and Privacy For Digital Health Human Factors in Network and System Security Types of submissions: Full Paper: presenting novel and original research findings. Submissions must adhere to a maximum limit of 20 pages. Short Paper: presenting original work-in-progress, which has not yet reached the level of maturity required for a full paper. Short papers should be limited to 10 pages. The title of each short paper should start with the phrase "Extended Abstract." Accepted short papers be included in the conference proceedings. Posters Participating in NSS/SocialSec 2024 by presenting a poster offers a valuable opportunity for students and researchers to receive feedback on their ongoing work from knowledgeable participants at the conference. We encourage the submission of posters that present unpublished in-progress or late-breaking research, as well as extensions of published work on security and privacy topics. We also welcome posters showcasing interdisciplinary work that is relevant to security and privacy research but was published outside the security community. Students/ researchers are invited to submit an abstract, along with a draft of the poster, describing their work for consideration. Abstracts should be no longer than two pages and must begin with the keyword "Poster:" The abstract should include all authors with their institutional affiliation and contact information. The abstract should briefly describe the problem being addressed and the approach taken. While providing preliminary results is suggested, it is not mandatory. If the work has been previously published outside the security community or is an extension of any published work, please include a reference to the existing publication. Please submit your poster proposals in PDF format, using the 2-column Springer template. You can find the template at https://www.springer.com/gp/authors-editors/conference-proceedings/conference-proceedings-guidelines. Remember, your proposal should include author information (name, affiliation, country) as it's not anonymous. The submission will be through EasyChair system. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|