posted by user: hakim15 || 71 views || tracked by 1 users: [display]

NSysS 2025 : The 12th International Conference on Next-generation computing, communication, Systems and Security

FacebookTwitterLinkedInGoogle

Link: https://cse.buet.ac.bd/nsyss2025/
 
When Dec 18, 2025 - Dec 20, 2025
Where Sylhet, Bangladesh
Submission Deadline Sep 1, 2025
Notification Due Nov 1, 2025
Final Version Due Nov 20, 2025
Categories    network and communication syst   ai for systems and networks   system security   application-specific system de
 

Call For Papers

Call for Papers
The 12th International Conference on Next Generation Computing, Communication, Systems and Security (12th NSysS 2025) aims to provide a forum for researchers, practitioners, developers, and users from academia, industry, and government to interact, present, and exchange new research ideas and results. NSysS 2025 will be held from December 18-20, 2025, in Sylhet, Bangladesh.

Special Invitations to Young Scientists!
We warmly invite undergraduate students engaged in research projects to submit papers, even if they are in the early stages or consist of preliminary results. Our conference provides thorough reviews and constructive feedback, with the possibility of senior researchers mentoring students to refine their work. This supportive environment ensures that students are not alone in their journey, helping them gain valuable experience, improve their research skills, and ultimately increase the likelihood of their work being published.

Important Dates
Paper submission deadline: September 01, 2025 (AoE)
Notification of paper acceptance: November 01, 2025 (AoE)
Camera-ready content submission: November 20, 2025 (AoE)
Poster submission deadline: November 20, 2025 (AoE)
Notification of poster acceptance: November 27, 2025 (AoE)
Program: December 18-20, 2025
Scope
We invite submissions on a broad range of topics. The scope of the conference includes, but is not limited to, the following.

===Network and Communication System Design===

Wireless, mobile, ad-hoc, and sensor networks
Network theory
Network science
Networking layers and protocols
Future internet design
Multicast, broadcast, and anycast
Multimedia protocols
Network architectures
Network management and traffic engineering
Network function virtualization (NFV)
Network simulation and emulation
Optical networks
Quality of service
Resource allocation and management
Satellite networks
Software-defined networking (SDN)
Topology characterization and inference
5G/6G Cellular and broadband wireless nets
Cognitive radio networking
Congestion control
Cross-layer design and optimization
Data reduction, inference, and signal processing
Delay/disruption tolerant networks
Semantic networking systems and protocols
Experimental results from operational networks or network applications
Near field communication
Novel components, devices, and architectures for networked sensing
P2P, overlay, and content distribution networks
RFID networks and protocols
Self-organizing networks

===AI for Systems and Networks===

AI-driven Network Optimization
Predictive Maintenance in Networks
AI for Cybersecurity
Intelligent Traffic Management
Adaptive Network Protocols
AI-enhanced Network Security Policies
Machine Learning for IoT Networks
AI-based Resource Allocation
Autonomous Network Management
AI for Edge Computing
Deep Learning for Network Anomaly Detection
AI in Network Function Virtualization (NFV)
Machine Learning for Signal Processing
AI for Wireless Network Management
AI in Software-Defined Networking (SDN)
Reinforcement Learning for Network Control
AI for Quality of Service (QoS) Optimization
AI-based Load Balancing in Networks
AI for Network Traffic Prediction
AI for Secure Communication Systems
Data-driven system design
Big data analytics
Machine learning, data mining, and applications (e.g., cybersecurity, healthcare, and networks)
Natural language processing (NLP) for systems
Security and privacy of systems based on machine learning and AI

===System Security===

Anti-malware techniques: detection, analysis, and prevention
Cyber-crime defense and forensics
Security for future Internet architectures and designs
Implementation, deployment, and management of network security policies
Integrating security in network protocols
Cyber attack prevention, detection, investigation, and response
Software/firmware analysis, customization, and transformation for systems security
Privacy and anonymity in networks and distributed systems
Security and privacy for blockchains and cryptocurrencies
Security for cloud/edge computing
Security and privacy of mobile/smartphone platforms
Security for cyber-physical systems
Security for emerging networks
Security for large-scale, critical infrastructures
Security of web-based applications and services
Usable security and privacy
Trustworthy computing software and hardware to secure networks and systems

===Application-specific System Design===

Smart grid
Mobile health
Transportation
Smart city
Manufacturing
Blockchain
Mobile, participatory, and social sensing
IoT and sensor technology
Underground and underwater networks
Unmanned air and ground vehicular networks
Mobile computing
Maritime Internet of Things

===Computing Systems===

Computer architecture
Cyber-physical systems and networking
Operating systems and runtime environments
Cloud and distributed systems
Edge intelligence
Embedded systems
Digital twin systems
Data centers

===Low Power System===

Energy harvesting
Energy optimization
Power control and management
Low-power, power-aware, and thermal-aware system design
Energy-efficient, energy-aware, and thermal-aware software and application design


===HCI System Development===

Human-computer interaction
Social computing and networks
Hardware, architectures, infrastructures, interaction design, technical foundations, algorithms to build new social and collaborative systems and experiences
Author Instructions
Authors are invited to submit papers describing original research of theoretical or practical significance. Submitted papers must describe work not previously published. They must not be submitted simultaneously to another conference with refereed proceedings or to a journal. The papers should be 6 to 8 pages (double column), including all figures, tables, appendices, and references in ACM format. Papers must be submitted in PDF format and formatted according to the new Standard ACM Conference Proceedings Template.

Information about formatting and style files is available online at https://www.acm.org/publications/proceedings-template.

The Overleaf template is available online at https://www.overleaf.com/latex/templates/acm-conference-proceedings-primary-article-template/wbvnghjbzwpc.

LaTex users have to use sample-sigconf.tex file as the template. If you prefer to use the Overleaf template, change the main document to sample-sigconf.tex file.

Word users have to use interim-layout.docx file as the template.

Only electronic submissions will be allowed. All papers submitted to the 12th NSysS 2025 need to be double-blind, i.e., no author name should appear in the submitted papers. There must not be any references that may reveal the author’s identity.

Important note to authors about the new ACM open access publishing model
ACM has introduced a new open access publishing model for the International Conference Proceedings Series (ICPS). Authors based at institutions that are not yet part of the ACM Open program and do not qualify for a waiver will be required to pay an article processing charge (APC) to publish their ICPS article in the ACM Digital Library. To determine whether or not an APC will be applicable to your article, please follow the detailed guidance here: https://www.acm.org/publications/icps/author-guidance.

Further information may be found on the ACM website, as follows:
Full details of the new ICPS publishing model: https://www.acm.org/publications/icps/faq
Full details of the ACM Open program: https://www.acm.org/publications/openaccess

Please direct all questions about the new model to icps-info@acm.org.

Paper Submission Link
All papers will be submitted to the Microsoft CMT Submission Portal.
Paper submission link: https://cmt3.research.microsoft.com/NSysS2025

Acknowledgement
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
CCAI 2026   IEEE--2026 6th International Conference on Computer Communication and Artificial Intelligence (CCAI 2026)
ICAIBD 2026   IEEE--2026 The 9th International Conference on Artificial Intelligence and Big Data (ICAIBD 2026)
CFP-CIPCV-EI/SCOPUS 2026   The 2026 4th International Conference on Intelligent Perception and Computer Vision
ICCCAS 2026   2026 IEEE the 15th International Conference on Communications, Circuits, and Systems (ICCCAS 2026)
ICCAI--EI 2026   2026 12th International Conference on Computing and Artificial Intelligence (ICCAI 2026)
IEEE CCAI 2026   IEEE--2026 6th International Conference on Computer Communication and Artificial Intelligence (CCAI 2026)
ICoSSE--Ei 2026   2026 9th International Conference on Software and System Engineering (ICoSSE 2026)
ISMSI--EI 2026   2026 10th International Conference on Intelligent Systems, Metaheuristics & Swarm Intelligence (ISMSI 2026)
CSP 2026   2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)