Abbrevation
NSS
City
New YorkNY
Country
United States
Deadline Paper
Start Date
End Date
Abstract

NSS is an annual international conference covering research in network and system security&#046; The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security&#046; Papers describing case studies, implementation experiences, and lessons learned are also encouraged&#046; Topics of interest include but are not limited to:<br>&#8211; Active Defense Systems &#8211; Adaptive Defense Systems<br>&#8211; Applied Cryptography &#8211; Analysis, Benchmark of Security Systems<br>&#8211; Authentication &#8211; Biometric Security<br>&#8211; Complex Systems Security &#8211; Database and System Security<br>&#8211; Data Protection &#8211; Data/System Integrity<br>&#8211; Distributed Access Control &#8211; Distributed Attack Systems<br>&#8211; Denial&#8211;of&#8211;Service &#8211; High Performance Network Virtualization<br>&#8211; Hardware Security &#8211; High Performance Security Systems<br>&#8211; Identity Management &#8211; Intelligent Defense Systems<br>&#8211; Insider Threats &#8211; Intellectual Property Rights Protection<br>&#8211; Internet and Network Forensics &#8211; Intrusion Detection and Prevention<br>&#8211; Key Distribution and Management &#8211; Large&#8211;scale Attacks and Defense<br>&#8211; Malware &#8211; Network Resiliency<br>&#8211; Network Security &#8211; RFID Security and Privacy<br>&#8211; Security Architectures &#8211; Security for Critical Infrastructures<br>&#8211; Security in P2P systems &#8211; Security in Cloud and Grid Systems<br>&#8211; Security in E&#8211;Commerce &#8211; Security in Pervasive/Ubiquitous Computing<br>&#8211; Security and Privacy in Smart Grid &#8211; Security and Privacy in Wireless Networks<br>&#8211; Security Policy &#8211; Secure Mobile Agents and Mobile Code<br>&#8211; Security Theory and Tools &#8211; Standards and Assurance Methods<br>&#8211; Trusted Computing &#8211; Trust Management<br>&#8211; World Wide Web Security<br>