Abbrevation
NDSS
City
San Diego
Country
United States
Deadline Paper
Start Date
End Date
Abstract

Areas of Interest<br>Submissions are solicited in, but not limited to, the following areas:<br>Anti&#8211;malware techniques: detection, analysis, and prevention<br>Cyber&#8211;crime defense and forensics (e&#046;g&#046;, anti&#8211;phishing, anti&#8211;blackmailing, anti&#8211;fraud techniques)<br>Security for future Internet architectures and designs (e&#046;g&#046;, Software&#8211;Defined Networking)<br>Implementation, deployment and management of network security policies<br>Integrating security in network protocols (e&#046;g&#046;, routing, naming, and management)<br>Cyber attack (e&#046;g&#046;, APTs, botnets, DDoS) prevention, detection, investigation, and response<br>Software/firmware analysis, customization, and transformation for systems security<br>Privacy and anonymity in networks and distributed systems<br>Security and privacy for blockchains and cryptocurrencies<br>Public key infrastructures, key management, certification, and revocation<br>Security for cloud/edge computing<br>Security and privacy of mobile/smartphone platforms<br>Security for cyber&#8211;physical systems (e&#046;g&#046;, autonomous vehicles, industrial control systems)<br>Security for emerging networks (e&#046;g&#046;, home networks, IoT, body&#8211;area networks, VANETs)<br>Security for large&#8211;scale, critical infrastructures (e&#046;g&#046;, electronic voting, smart grid)<br>Security and privacy of systems based on machine learning and AI<br>Security of Web&#8211;based applications and services (e&#046;g&#046;, social networking, crowd&#8211;sourcing)<br>Special problems and case studies: e&#046;g&#046;, tradeoffs between security and efficiency, usability, cost, and ethics<br>Usable security and privacy<br><div>Trustworthy Computing software and hardware to secure networks and distributed systems<br></div><div><br></div>