posted by user: Busra || 1742 views || tracked by 6 users: [display]

NCS 2026 : 18th International Conference on Network and Communications Security

FacebookTwitterLinkedInGoogle

Link: https://cosit2026.org/index
 
When Jul 16, 2026 - Jul 17, 2026
Where London, United Kingdom
Submission Deadline Apr 25, 2026
Notification Due Jun 20, 2026
Final Version Due Jun 27, 2026
Categories    communications   networking   network security   networks
 

Call For Papers

18th International Conference on Network and Communications Security (NCS 2026)

July 16 ~ 17, 2026, London, United Kingdom

Scope & Topics

18th International Conference on Network and Communications Security (NCS 2026) is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Topics of interest include, but are not limited to, the following

    Cryptography and Theoretical Security

  • Applied Cryptography and Cryptanalysis
  • Post Quantum Cryptography and Quantum Safe Protocols
  • Secure Multi Party Computation, Homomorphic Encryption and Zero Knowledge Proofs
  • Blockchain, Smart Contract, DeFiand Consensus Security
  • Privacy Preserving Cryptographic Techniques (MPC, DP, FL)
  • Verifiable Computation and Cryptographic Proof Systems

    Network, Cloud and Distributed Systems Security

  • Network Security Protocols and Architectures
  • Cloud Security (IaaS, PaaS, SaaS) and Multi Tenant Isolation
  • Cloud IAM, Misconfiguration Attacks and API Exploitation
  • Serverless, Container, Kubernetes andMicroservices Security
  • SDN/NFV Security and Virtualized Network Infrastructure
  • 5G/6G, Mobile, Wireless and Edge Network Security
  • IoT, Cyber Physical Systems and ICS/SCADA Security
  • Satellite, Space Systems and Maritime Communication Security
  • Edge/Perimeter Appliance Security (VPNs, Routers, Gateways)

    AI, Machine Learning and Autonomous Systems Security

  • Machine Learning for Security and Threat Detection
  • Adversarial Machine Learning and Model Robustness
  • Security of LLMs, Foundation Models and AI Agents
  • Prompt Injection, Jailbreaks and Model Extraction Attacks
  • Autonomous AI Driven Cyber attacks and Automated Exploitation
  • AI Accelerated Malware and Reconnaissance
  • AI Governance, Model Context Protocol (MCP) Security and Supply Chain Risks
  • Privacy in ML (membership inference, model inversion)

    Software, Application and Hardware Security

  • Secure Software Engineering, DevSecOpsand Software Supply Chain Security
  • Vulnerability Discovery, Fuzzing and Automated Exploit Generation
  • Web, Browser and Client Side Security
  • Operating System, Virtualization and Hypervisor Security
  • Trusted Execution Environments (TEE), Confidential Computing and Remote Attestation
  • Hardware Security, Side Channel andMicroarchitectural Attacks (Spectre, Rowhammer, etc.)
  • Embedded Systems, Firmware, Automotive and Robotics Security
  • API Security (BOLA, auth bypass, API gateway vulnerabilities

    Threats, Attacks, Detection and Defense

  • Intrusion Detection, Prevention and Threat Hunting
  • Malware, Ransomware, Botnets and APT Campaigns
  • Data Only Extortion, Decentralized Ransomware and Double/Triple Extortion Models
  • DDoS Attacks, Traffic Manipulation and Network Abuse
  • Insider Threat Detection and Behavioral Analytics
  • Offensive Security, Penetration Testing and Red/Blue/Purple Teaming
  • Automated Incident Response, SOAR and Security Telemetry Analytics
  • Cyber Deception, Moving Target Defense and Resilience Engineering
  • Rapid Zero Day Weaponisation and Exploit Automation

    Privacy, Trust and Human Centric Security

  • Privacy Enhancing Technologies (PETs)
  • Anonymous Communication Networks and Censorship Resistance
  • Human Factors, Usable Security and Cognitive Bias Exploitation
  • Identity, Authentication and Authorization (Passwordless, FIDO2/WebAuthn)
  • Biometric Security and Liveness Detection
  • Digital Identity, SSI and Verifiable Credentials
  • Privacy in Social Networks, Online Platforms and Sensitive Data Domains

    Emerging Domains and Sector Specific Security

  • Autonomous Vehicles, Drones and Robotics Security
  • Smart Cities, Smart Grids and Critical Infrastructure Protection
  • Healthcare, Medical Devices and Bio Cybersecurity
  • FinTech, Open Banking and Financial API Security
  • EdTech, Credential Marketplaces and Academic Integrity Systems
  • Quantum Networking and Post Quantum Systems Security
  • Cyber Geopolitical Conflict, Hybrid Operations and State Aligned Threats
  • Digital Forensics, Incident Response and Cybercrime Investigation
  • Risk Assessment, Security Metrics and Cyber Resilience

    Media, Content Integrity and Information Security

  • Multimedia Security, Steganography and Digital Watermarking
  • Deepfake Detection, Synthetic Media Security and Generative Content Abuse
  • Content Authenticity, Provenance and Anti Manipulation Technologies
  • Intellectual Property Protection and Anti Piracy Technologies

    Financial, Commercial and Transaction Security

  • Fin Tech, Banking and Payment Systems Security
  • Crypto currency, DeFi and Blockchain Based Financial Systems
  • Fraud Detection, Anti Money Laundering (AML) and Transaction Integrity
  • Secure Digital Commerce and High Risk Transaction Protection

Paper Submission

Authors are invited to submit papers through the conference Submission System by April 25, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from NCS 2026, after further revisions, will be published in the special issue of the following journals.

Important Dates

Submission Deadline: April 25, 2026
Authors Notification: June 20, 2026
Final Manuscript Due: June 27, 2026

Co - Located Event

***** The invited talk proposals can be submitted to ncs@ncs2026.org


Related Resources

ICICC 2026   2026 6th International Conference on Intelligent Communications and Computing
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
CNCIT 2026   2026 5th International Conference on Networks, Communications and Information Technology
EDUR 2026   4th International Conference on Educational Research
ICAISM 2026   2026 2nd International Conference on Artificial Intelligence and Smart Manufacturing-EI/Scopus
NeTCoM 2026   18th International Conference on Networks & Communications
IEEE-Ei/Scopus-ICISC 2026   2025 6th International Conference on Intelligent System and Computing (ICISC 2026)
CVIPPR 2026   2026 4th Asia Conference on Computer Vision, Image Processing and Pattern Recognition (CVIPPR 2026)
NLP 2026   15th International Conference on Natural Language Processing
NCO 2026   13th International Conference on Foundations of Computer Science & Technology