征稿信息
Areas/Topics of Interest
Submissions are solicited in, but not limited to, the following areas:
Anti-malware techniques: detection, analysis, and prevention
Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
Integrating security in network protocols (e.g., routing, naming, and management)
Mobile and wireless network security
Network security policy implementation, deployment, and management
Privacy and anonymity in networks and distributed systems
Public key infrastructures, key management, certification, and revocation
Security and privacy for blockchains and cryptocurrencies
Security and privacy of mobile/smartphone platforms and their operating systems
Security and privacy of systems based on machine learning, federated learning, AI, and large language models
Security for cloud/edge computing
Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
Security for emerging networks (e.g., smart homes, IoT, body-area networks, VANETs)
Security for future Internet architectures and designs (e.g., Software-Defined Networking)
Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
Security of web-based applications and services (e.g., social networking, crowd-sourcing, fake news/disinformation), web security and privacy
Software/firmware/hardware security analysis, customization, and extensions
Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
Trustworthy computing software and hardware to secure networks and systems
Usable security and privacy
A special note on “fit” for all submissions: NDSS is primarily a venue focusing on network and systems security. As such, the Program Committee will be looking for papers that have a clear relation to real systems, networks, and their applications. For instance, a paper that makes significant contributions in an area such as theoretical cryptography but that fails to demonstrably tie those advances to real systems is unlikely to be accepted.