|
| Call for Papers
New: Call for industry track papers! Download CFP: [TXT]
NSS is an annual international conference covering research in network and system security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. The Industrial Track of NSS 2013 invites submissions in applying recent research advances to real-world problems on on the same topics as academic track. Submit your papers at www.easychair.org/conferences/?conf=nss2013industrytrack
Important Dates
Paper Submission Due: March 20, 2013
Authors Notification: March 26, 2013
Final Manuscript Due: April 2, 2013
Registration Due: April 2, 2013
Conference Dates: June 3-4, 2013
Academic Track
Download CFP: [PDF] [TXT] Contact: xyhuang81@gmail.com
NSS is an annual international conference covering research in network and system security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to: - Active Defense Systems - Adaptive Defense Systems - Analysis, Benchmark of Security Systems - Applied Cryptography - Authentication - Biometric Security - Complex Systems Security - Database and System Security - Data Protection - Data/System Integrity - Distributed Access Control - Distributed Attack Systems - Denial-of-Service - High Performance Network Virtualization - High Performance Security Systems - Hardware Security - Identity Management - Intelligent Defense Systems - Insider Threats - Intellectual Property Rights Protection - Internet and Network Forensics - Intrusion Detection and Prevention - Key Distribution and Management - Large-scale Attacks and Defense - Malware - Network Resiliency - Network Security - RFID Security and Privacy - Security Architectures - Security for Critical Infrastructures - Security in P2P systems - Security in Cloud and Grid Systems - Security in E-Commerce - Security in Pervasive/Ubiquitous Computing - Security and Privacy in Smart Grid - Security and Privacy in Wireless Networks - Secure Mobile Agents and Mobile Code - Security Policy - Security Protocols - Security Simulation and Tools - Security Theory and Tools - Standards and Assurance Methods - Trusted Computing - Trust Management - World Wide Web Security | |
| |