NordSec: Nordic Conference on Secure IT Systems

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
NordSec 2024 The 29th Nordic Conference on Secure IT systems (NordSec) 2024
Nov 6, 2024 - Nov 7, 2024 Karlstad, Sweden Aug 28, 2024
NordSec 2023 28th Nordic Conference on Secure IT systems (NordSec) 2023
Nov 16, 2023 - Nov 17, 2023 Oslo Metropolitan University, Norway Aug 1, 2023
NordSec 2022 The 27th Nordic Conference on Secure IT Systems
Nov 30, 2022 - Dec 2, 2022 Reykjavik, Iceland Aug 31, 2022
NordSec 2018 23rd Nordic Conference on Secure IT Systems
Nov 28, 2018 - Nov 30, 2018 Oslo, Norway Aug 15, 2018
NordSec 2017 Nordic Conference on Secure IT Systems
Nov 8, 2017 - Nov 10, 2017 Tartu, Estonia Jul 21, 2017
NordSec 2013 The 18th Nordic Conference on Secure IT Systems
Oct 18, 2013 - Oct 21, 2013 Ilulissat, Greenland May 6, 2013 (Apr 29, 2013)
NordSec 2012 17th Nordic Conference on Secure IT Systems
Oct 31, 2012 - Nov 2, 2012 Karlskrona, Sweden Aug 15, 2012
NordSec 2011 16th Nordic Conference in Secure IT Systems
Oct 26, 2011 - Oct 28, 2011 Tallinn, Estonia Aug 6, 2011 (Jul 31, 2011)
NordSec 2009 The 14th Nordic Conference on Secure IT Systems
Oct 14, 2009 - Oct 16, 2009 Oslo Aug 15, 2009
 
 

Present CFP : 2024

The 29th Nordic Conference on Secure IT Systems will take place at Karlstad University from 6th to 7th of November 2024.

Nordic Conference on Secure IT Systems
NordSec is an annual research conference series that has been running since 1996. The NordSec conferences address a broad range of topics on IT security. The events bring together security researchers from the Nordic countries, Northern Europe, and beyond. In addition to being a venue for academic publishing, NordSec is an important meeting place for university faculty, students, and industry researchers and experts from the region. In 2024, the conference has special focus on Security and Privacy Engineering, acknowledging the challenge of addressing issues in the development of socio-technical systems, as found within areas of complex societal infrastructures, health and social care, smart cities and communities, national security, and many other industry sectors (e.g., automotive, energy, banking). In this edition, we also highlight the growing impact of AI/ML to the security and privacy research fields.

NordSec addresses a broad range of topics within cybersecurity, with the aim of bringing together computer security researchers and practitioners, encouraging interaction between academia and industry.

Proceedings will be published in Springer LNCS, Lecture Notes in Computer Science.

General chairs
- Leonardo A. Martucci
- Liina Kamm

Program chairs
- Leonardo Horn Iwaya
- Tobias Pulls

Important deadlines
- (Deadline Extension) Submission of manuscripts: ***28th of August, 2024***
- Notification of acceptance: 20th of September, 2024
- Camera-ready version due: 30th of September, 2024
- Conference presentation: 6-7th of November, 2024 in Karlstad, Sweden.

Possible topics include, but are not limited to
- Applied cryptography
- Artificial intelligence and machine learning for cybersecurity and privacy
- Blockchains
- Cloud security
- Confidential computing
- Cryptanalysis
- Cryptographic protocols
- Cyber crime, warfare, and forensics
- Economic, legal, and social aspects of security and privacy
- Formal analysis
- Hardware and smart card security
- Identity and Access Management
- Information flow security
- Intrusion detection and mitigation
- Language-based security
- Mobile, embedded, and Internet of Things security and privacy
- Operating System security
- Privacy-enhancing technologies
- Security and privacy engineering
- Security and privacy for artificial intelligence and machine learning
- Security education and training
- Security management and audit
- Security and privacy metrics
- Security and privacy protocols
- Social engineering and phishing
- Software security and malware
- Threat modelling and threat intelligence
- Trust and identity management
- Usable security and privacy
- Vulnerability testing
- Web application security

Contributions should reflect original research, developments, studies, or experience. Submitted papers should not exceed 16 pages (excluding references and appendices) in Springer LNCS format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Submission guidelines
All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission:

Remove the names and affiliations of authors from the title page.

Remove acknowledgment of identifying names and funding sources.

Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author.

We encourage the inclusion of anonymized digital research artifacts in the form of anonymized download links in the submitted manuscript. Tools like https://github.com/tdurieux/anonymous_github/ could be useful to authors to anonymize links and contents of research artifacts consisting in code repositories.

Submissions should be formatted using the Springer LNCS format and must not exceed 16 pages (excluding well-marked appendices, and references), with an overall limit of 20 pages. Appendices may be included to assist reviewers who may have questions that fall outside the stated contribution of the paper on which your work is to be evaluated or to provide details that would only be of interest to a small minority of readers. Reviewers are not required to read any appendices, so the paper should be self-contained without them. Finally, notice that, according to latest LNCS guidelines, if a paper includes appendices, they should be placed in front of the references. Please refer to the Springer Instructions for Authors document for further details!

There is an Overleaf template available for the Springer LNCS format.

All submissions will be peer-reviewed by at least three members of the program committee.

Papers must be written in English and submitted online in PDF format at https://easychair.org/conferences/?conf=nordsec2024.

Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference.

By submitting a paper, you agree that at least one of the authors will physically attend the conference to present it.

NordSec 2024 will publish fully digital online proceedings with Springer Nature in the LNCS series. All authors will get time-limited full access to the full text proceedings.
 

Related Resources

NoDaLiDa/Baltic-HLT 2025   The Joint 25th Nordic Conference on Computational Linguistics and 11th Baltic Conference on Human Language Technologies
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MODERN SYSTEMS 2025   International Conference of Modern Systems Engineering Solutions
ICPRS 2025   15th International Conference on Pattern Recognition Systems
IJCSITY 2024   International Journal of Computational Science and Information Technology