| |||||||||||
NSS 2020 : 14th International Conference on Network and System SecurityConference Series : Network and System Security | |||||||||||
Link: http://nsclab.org/nss2020/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
The 14th International Conference on Network and System Security (NSS2020) seeks submissions presenting novel contributions related to all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. The aim of NSS is to provide a leading-edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. Authors of each accepted paper must ensure that at least one author registers for the conference, and that their paper is presented in-person at the conference.
Since the first NSS held in Dalian 2007, NSS has been successfully held in: Sapporo, Japan (2019), Hong Kong, China (2018), Helsinki, Finland (2017), Taipei (2016), New York City, USA (2015), Xi'an, China (2014), Madrid, Spain (2013), Wu Yi Shan, China (2012), Milan, Italy (2011), Melbourne, Australia (2010), Gold Coast, Australia (2009), Shanghai, China (2008). After a decade, NSS is back in Melbourne. This year we have invited world-renowned security experts to deliver keynotes, such as Prof. Elisa Bertino, Prof. Robert Deng, Prof. Jaideep Vaidya, Prof Kui Ren, Prof Wanlei Zhou, and Prof. Xun Yi. Topics of interest include but are not limited to: • Active Defense Systems • Ai/Machine Learning Security • Analysis, Benchmark of Security Systems • Applied Cryptography • Authentication • Big Data Trust, Security and Privacy • Biometric Security • Blockchain and Bitcoin Security • Smart Contract • Cyber Hacking and Protection • Computer and network forensics • Database and System Security • Data and application security • Decision Modelling and Optimization for Security and Privacy Aspects • Digital Forensics • Facility Location and Network Design for Securing the E-Society • Game-theoretic Security Technologies • Hardware Security • High Performance Security Systems • Implementation and Evaluation of Networked Security Systems • Information-theoretic Security • Intelligent Defense Systems • Internet and Network Forensics • Intrusion Detection and Prevention • Large-scale Attacks and Defense • Location Privacy • Network Resiliency • Network Security • Security Infrastructure • Security Metrics and Models • Security for Critical Infrastructures • Security for Cyber Physical Systems • Security for Software-defined and Data Center Networks • Security in Cloud and Grid Systems • Security and Privacy for Digital Health • Security and Privacy in Smart Cities, Smart and Connected Health, IoT, and RFID Systems • Security and Privacy in Social Networks • Security and Privacy in Wireless Networks • Secure Mobile Agents and Mobile Code • Security Policy • Security Protocols • Software Security • Security Theory and Tools • Security, Trust and Privacy in Crowdsourcing, Crowdsensing and CrowdPayment • Security, Trust and Privacy in Internet of Things • Trusted Computing • Trust Management • Viruses and Malware • Watermarking and Digital Rights Management • Web, E-commerce, M-commerce, and E-mail Security • World Wide Web Security Paper Submission Information: Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline. |
|