![]() |
| |||||||||||||||
NSysS 2025 : The 12th International Conference on Next-generation computing, communication, Systems and Security | |||||||||||||||
Link: https://cse.buet.ac.bd/nsyss2025/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
The 12th International Conference on Next Generation Computing, Communication, Systems and Security (12th NSysS 2025) aims to provide a forum for researchers, practitioners, developers, and users from academia, industry, and government to interact, present, and exchange new research ideas and results. NSysS 2025 will be held from December 18-20, 2025, in Sylhet, Bangladesh. Special Invitations to Young Scientists! We warmly invite undergraduate students engaged in research projects to submit papers, even if they are in the early stages or consist of preliminary results. Our conference provides thorough reviews and constructive feedback, with the possibility of senior researchers mentoring students to refine their work. This supportive environment ensures that students are not alone in their journey, helping them gain valuable experience, improve their research skills, and ultimately increase the likelihood of their work being published. Important Dates Paper submission deadline: September 01, 2025 (AoE) Notification of paper acceptance: November 01, 2025 (AoE) Camera-ready content submission: November 20, 2025 (AoE) Poster submission deadline: November 20, 2025 (AoE) Notification of poster acceptance: November 27, 2025 (AoE) Program: December 18-20, 2025 Scope We invite submissions on a broad range of topics. The scope of the conference includes, but is not limited to, the following. ===Network and Communication System Design=== Wireless, mobile, ad-hoc, and sensor networks Network theory Network science Networking layers and protocols Future internet design Multicast, broadcast, and anycast Multimedia protocols Network architectures Network management and traffic engineering Network function virtualization (NFV) Network simulation and emulation Optical networks Quality of service Resource allocation and management Satellite networks Software-defined networking (SDN) Topology characterization and inference 5G/6G Cellular and broadband wireless nets Cognitive radio networking Congestion control Cross-layer design and optimization Data reduction, inference, and signal processing Delay/disruption tolerant networks Semantic networking systems and protocols Experimental results from operational networks or network applications Near field communication Novel components, devices, and architectures for networked sensing P2P, overlay, and content distribution networks RFID networks and protocols Self-organizing networks ===AI for Systems and Networks=== AI-driven Network Optimization Predictive Maintenance in Networks AI for Cybersecurity Intelligent Traffic Management Adaptive Network Protocols AI-enhanced Network Security Policies Machine Learning for IoT Networks AI-based Resource Allocation Autonomous Network Management AI for Edge Computing Deep Learning for Network Anomaly Detection AI in Network Function Virtualization (NFV) Machine Learning for Signal Processing AI for Wireless Network Management AI in Software-Defined Networking (SDN) Reinforcement Learning for Network Control AI for Quality of Service (QoS) Optimization AI-based Load Balancing in Networks AI for Network Traffic Prediction AI for Secure Communication Systems Data-driven system design Big data analytics Machine learning, data mining, and applications (e.g., cybersecurity, healthcare, and networks) Natural language processing (NLP) for systems Security and privacy of systems based on machine learning and AI ===System Security=== Anti-malware techniques: detection, analysis, and prevention Cyber-crime defense and forensics Security for future Internet architectures and designs Implementation, deployment, and management of network security policies Integrating security in network protocols Cyber attack prevention, detection, investigation, and response Software/firmware analysis, customization, and transformation for systems security Privacy and anonymity in networks and distributed systems Security and privacy for blockchains and cryptocurrencies Security for cloud/edge computing Security and privacy of mobile/smartphone platforms Security for cyber-physical systems Security for emerging networks Security for large-scale, critical infrastructures Security of web-based applications and services Usable security and privacy Trustworthy computing software and hardware to secure networks and systems ===Application-specific System Design=== Smart grid Mobile health Transportation Smart city Manufacturing Blockchain Mobile, participatory, and social sensing IoT and sensor technology Underground and underwater networks Unmanned air and ground vehicular networks Mobile computing Maritime Internet of Things ===Computing Systems=== Computer architecture Cyber-physical systems and networking Operating systems and runtime environments Cloud and distributed systems Edge intelligence Embedded systems Digital twin systems Data centers ===Low Power System=== Energy harvesting Energy optimization Power control and management Low-power, power-aware, and thermal-aware system design Energy-efficient, energy-aware, and thermal-aware software and application design ===HCI System Development=== Human-computer interaction Social computing and networks Hardware, architectures, infrastructures, interaction design, technical foundations, algorithms to build new social and collaborative systems and experiences Author Instructions Authors are invited to submit papers describing original research of theoretical or practical significance. Submitted papers must describe work not previously published. They must not be submitted simultaneously to another conference with refereed proceedings or to a journal. The papers should be 6 to 8 pages (double column), including all figures, tables, appendices, and references in ACM format. Papers must be submitted in PDF format and formatted according to the new Standard ACM Conference Proceedings Template. Information about formatting and style files is available online at https://www.acm.org/publications/proceedings-template. The Overleaf template is available online at https://www.overleaf.com/latex/templates/acm-conference-proceedings-primary-article-template/wbvnghjbzwpc. LaTex users have to use sample-sigconf.tex file as the template. If you prefer to use the Overleaf template, change the main document to sample-sigconf.tex file. Word users have to use interim-layout.docx file as the template. Only electronic submissions will be allowed. All papers submitted to the 12th NSysS 2025 need to be double-blind, i.e., no author name should appear in the submitted papers. There must not be any references that may reveal the author’s identity. Important note to authors about the new ACM open access publishing model ACM has introduced a new open access publishing model for the International Conference Proceedings Series (ICPS). Authors based at institutions that are not yet part of the ACM Open program and do not qualify for a waiver will be required to pay an article processing charge (APC) to publish their ICPS article in the ACM Digital Library. To determine whether or not an APC will be applicable to your article, please follow the detailed guidance here: https://www.acm.org/publications/icps/author-guidance. Further information may be found on the ACM website, as follows: Full details of the new ICPS publishing model: https://www.acm.org/publications/icps/faq Full details of the ACM Open program: https://www.acm.org/publications/openaccess Please direct all questions about the new model to icps-info@acm.org. Paper Submission Link All papers will be submitted to the Microsoft CMT Submission Portal. Paper submission link: https://cmt3.research.microsoft.com/NSysS2025 Acknowledgement The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support. |
|