| |||||||||||||
NDSS 2019 : Network and Distributed System Security SymposiumConference Series : Network and Distributed System Security Symposium | |||||||||||||
Link: http://www.ndss-symposium.org/ndss2019/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Important Dates
August 7, 2018 11:59PM EDT: Full submissions for technical papers October 2, 2018 (tentative): Early notification for submissions rejected in the first round October 2-4, 2018: Author rebuttal period for papers advancing to the second round November 6, 2018 (tentative): Final notification of acceptance/rejection February 24-27, 2019: NDSS Symposium, San Diego, CA USA Areas of Interest Submissions are solicited in, but not limited to, the following areas: Anti-malware techniques: detection, analysis, and prevention Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques) Security for future Internet architectures and designs (e.g., Software-Defined Networking) Implementation, deployment and management of network security policies Integrating security in network protocols (e.g., routing, naming, and management) Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response Software/firmware analysis, customization, and transformation for systems security Privacy and anonymity in networks and distributed systems Security and privacy for blockchains and cryptocurrencies Public key infrastructures, key management, certification, and revocation Security for cloud/edge computing Security and privacy of mobile/smartphone platforms Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems) Security for emerging networks (e.g., home networks, IoT, body-area networks, VANETs) Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid) Security and privacy of systems based on machine learning and AI Security of Web-based applications and services (e.g., social networking, crowd-sourcing) Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics Usable security and privacy Trustworthy Computing software and hardware to secure networks and distributed systems |
|