Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

9th International Conference on Networks and Security (NSEC 2025)

NSEC 2025

Categories

Date of beginning

Saturday, 21 June 2025

Duration

2 days

Deadline for abstracts

Saturday, 17 May 2025

City

Sydney, Australia

Country

Sydney, Australia

Contact

NSEC 2025

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

100

Memo

9th International Conference on Networks and Security (NSEC 2025) June 21 ~ 22, 2025, Sydney, Australia https://inwes2025.org/nsec/index Scope 9th International Conference on Networks and Security (NSEC 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks and Communications security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Topics of interest include, but are not limited to, the following Access control, Anonymity, Audit and audit reduction & Authentication and authorization Algorithms and Bioinformatics Big Data Security, Privacy and Trust Bio metric security Blockchain and Distributed Ledger Boundary control devices Certification and accreditation Cross-layer design for security Data and System Integrity, Database security Data Mining Defensive Information Warfare Distributed Systems Security Electronic Commerce E-mail Security, Spam, Phishing, E-mail fraud, Virus, Worms, Trojan Protection Grid Security Information Hiding and Watermarking & Information Survivability Insider Threat Protection, Integrity Intellectual Property Protection Internet of Things (IoT) Security Internet/Intranet Security Key Management and key Recovery Language-based Security Machine Learning & AI based Security Mobile and Wireless Security Mobile, Ad Hoc and Sensor Network Security Monitoring and Surveillance Multimedia Security ,Operating System Security, Peer-To-Peer Security NLP for Security Performance Evaluations of Protocols & Security Application Privacy and Data Protection Product Evaluation Criteria and Compliance Risk Evaluation and Security certification Risk/vulnerability Assessment Security & Network Management Security and Information Hiding in Data Mining Security Models & Protocols Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc) Trusted Computing Ubiquitous Computing Security Paper Submission Authors are invited to submit papers through the conference Submission System by May 17, 2025. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).   Selected papers from NSEC 2025, after further revisions, will be published in the special issue of the following journal. International Journal of Computer Networks & Communications (IJCNC) – Scopus Listed, ERA,WJCI Indexed International Journal of Network Security & Its Applications (IJNSA) – ERA,WJCI Indexed Information Technology in Industry (ITII) Important Dates Submission Deadline: May 17, 2025 Authors Notification: June 13, 2025 Registration & camera – Ready Paper Due:  June 17, 2025 Contact Us Here’s where you can reach us : This email address is being protected from spambots. You need JavaScript enabled to view it. (or) This email address is being protected from spambots. You need JavaScript enabled to view it.