Abbrevation
NSS
City
Helsinki
Country
Finland
Deadline Paper
Start Date
End Date
Abstract

While the attack systems have become more easy&#8211;to&#8211;use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked&#046; The conference will cover research on all theoretical and practical aspects related to network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability, trustworthiness, and sustainability of computer networks and systems&#046; The aim of NSS is to provide a leading edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments&#046; NSS 2017 is the next event in a series of highly successful events of Network and System Security&#046; Previous editions were held in: Taipei (2016), New York City, USA (2015), Xi&#8242;an, China (2014), Madrid, Spain (2013); Wu Yi Shan, China (2012); Milan, Italy (2011); Melbourne, Australia; (2010); Gold Coast, Australia (2009); Shanghai, China (2008); and Dalian, China (2007)&#046;<br>Topics of interest include but are not limited to:<br>&#8211; Active Defense Systems<br>&#8211; Adaptive Defense Systems<br>&#8211; Analysis, Benchmark of Security Systems<br>&#8211; Applied Cryptography<br>&#8211; Authentication<br>&#8211; Big Data Trust, Security and Privacy<br>&#8211; Biometric Security<br>&#8211; Complex Systems Security<br>&#8211; Database and System Security<br>&#8211; Data Protection<br>&#8211; Data/System Integrity<br>&#8211; Digital Forensics<br>&#8211; Distributed Access Control<br>&#8211; Distributed Attack Systems<br>&#8211; Denial&#8211;of&#8211;Service<br>&#8211; High Performance Network Virtualization<br>&#8211; High Performance Security Systems<br>&#8211; Hardware Security<br>&#8211; Identity Management<br>&#8211; Intelligent Defense Systems<br>&#8211; Insider Threats<br>&#8211; Intellectual Property Rights Protection<br>&#8211; Internet and Network Forensics<br>&#8211; Intrusion Detection and Prevention<br>&#8211; Key Distribution and Management<br>&#8211; Large&#8211;scale Attacks and Defense<br>&#8211; Malware<br>&#8211; Network Resiliency<br>&#8211; Network Security<br>&#8211; RFID/NFC Security and Privacy<br>&#8211; Security Architectures<br>&#8211; Security for Critical Infrastructures<br>&#8211; Security for Cyber Physical Systems<br>&#8211; Security in Cloud and Grid Systems<br>&#8211; Security in Pervasive/Ubiquitous Computing<br>&#8211; Security and Privacy in Smart Grid<br>&#8211; Security and Privacy in Social Networks<br>&#8211; Security and Privacy in Wireless Networks<br>&#8211; Secure Mobile Agents and Mobile Code<br>&#8211; Security Policy<br>&#8211; Security Protocols<br>&#8211; Security Simulation and Tools<br>&#8211; Security Theory and Tools<br>&#8211; Standards and Assurance Methods<br>&#8211; Trusted Computing<br>&#8211; Trust Management<br>&#8211; World Wide Web Security<br>