NDSS 2026
If you are interested in the practical aspects of network and distributed system security with a focus on actual system design and implementation, the NDSS Symposium is for you. Join the 33rd edition of the Network and Distributed System Security Symposium (NDSS) to discuss the latest research and developments in Internet security research.
所属领域:网络与信息安全
CCF推荐:A
录用率:16.1%(211/1311,2025年)
时间地点:2026年2月23日-加州(美国)
大会议题
·Anti-malware techniques: detection, analysis, and prevention
·Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
·Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
·Integrating security in network protocols (e.g., routing, naming, and management)
·Mobile and wireless network security
·Network security policy implementation, deployment, and management
·Privacy and anonymity in networks and distributed systems
·Public key infrastructures, key management, certification, and revocation
·Security and privacy for blockchains and cryptocurrencies
·Security and privacy of mobile/smartphone platforms
·Security and privacy of operating systems, hypervisors, and virtual machines
·Security and privacy of systems based on machine learning, federated learning, AI, and large language models
·Security for cloud/edge computing
·Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
·Security for emerging networks (e.g., smart homes, IoT, body-area networks, VANETs)
·Security for future Internet architectures and designs (e.g., Software-Defined Networking, Intent-Based Networking)
·Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
·Security of web-based applications and services (e.g., social networking, crowd-sourcing, fake news/disinformation), web security and privacy
·Software/firmware/hardware security analysis, customization, and extensions
·Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
·Trustworthy computing software and hardware to secure networks and systems
·Usable security and privacy