New York Conferences 2023 - International Conference on Network Security
September 1-3, 2023
New York City

Submission Guidelines

We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Formatting Guidelines

Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
Topics of interest for submission include but are not limited to:
Anonymity and privacy technologies
Biometric authentication and identity management
Security and privacy of blockchain and its applications
Censorship countermeasures and privacy
Combating cyber-crime (anti-spam, anti-phishing anti-fraud techniques, etc.)
Computer and network forensics
Cyber deterrence strategies
Data and application security
Data protection and integrity
Game-theoretic security technologies
Implementation and evaluation of networked security systems
Information-theoretic security
Intrusion detection, prevention, and response
Key management, public key infrastructures, certification revocation, authentication, and access control
Malware detection, prevention, and mitigation
Security metrics and models
Physical-layer and cross-layer security technologies
Security and privacy for big data and machine learning
Security and privacy for data and network outsourcing
Security and privacy for mobile and wearable devices
Security and privacy in cellular networks
Security and privacy in cloud and edge computing
Internet Security: Protocols, standards, measurements
Security and privacy in crowdsourcing
Security and privacy in cyber-physical systems (CPS)
Security and privacy in Internet of Things (IoT)
Security and privacy in emerging wireless technologies and applications 
Security and privacy in peer-to-peer and overlay networks
Security and privacy in WiFi, ad hoc, mesh, sensor, body-area, and disruption/delay tolerant systems
Security and privacy in smart cities, smart and connected health, and other smart systems/buildings/offices
Security for critical infrastructures (smart grids, transportation systems, etc.)
Security for future Internet architectures and designs
Security for software-defined and data center networks
Security and privacy in connected/autonomous vehicles, UAVs/UAS, drones, etc.
Security and privacy of social networks, metaverse/virtual/augmented reality-based networks/systems
Social, economic, and policy issues of trust, security, and privacy
Traffic analysis
Usable security and privacy
Web, e-commerce, m-commerce, and e-mail security