
17th International Conference on Network and Communications Security (NCS 2025)
July 19 ~ 20 2025 Toronto Canada
https://cseit2025.org/ncs/index
Scope & Topics
17th International Conference on Network and Communications Security (NCS 2025) is a shift away from the traditional client-server model to systems based on the peer-to peer network which allows users share resources effectively. Also due to increase in number of Internet applications & users the security issues and pivotal challenges include integrity verification authentication and access control etc. are also increasing. As a consequence the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology the applications in commercial security scenario become increasing essential.
Topics of interest include but are not limited to the following
· Access Control Anonymity Audit
· Applied Cryptography Cryptanalysis Digital Signatures
· Audit Reduction & Authentication
· Authorization
· Big Data Security Privacy and Trust
· Biometric Security
· Blockchain
· Boundary Control Devices
· Certification and Accreditation
· Cross-Layer Design for Security
· Data and System Integrity Database Security
· Defensive Information Warfare
· Denial of Service Protection Intrusion Detection Anti-Malware
· Distributed Systems Security
· Electronic Commerce
· E-mail Security Spam Phishing E-mail Fraud Virus Worms Trojon Protection
· Game and Software Engineering
· Grid Security
· Information Hiding and Watermarking
· Information Survivability
· Insider Threat Protection Integrity
· Intellectual Property Protection
· Internet/Intranet Security
· Key Management and Key Recovery
· Language-Based Security
· Machine Learning based Security
· Mobile and Wireless Security
· Mobile Ad Hoc and Sensor Network Security
· Monitoring and Surveillance
· Multimedia Security Operating System Security Peer-to-Peer Security
· NLP for Security
· Performance Evaluations of Protocols & Security Application
· Privacy and Data Protection
· Product Evaluation Criteria and Compliance
· Risk Evaluation and Security Certification
· Risk/Vulnerability Assessment
· Security & Network Management
· Security and Information Hiding in Data Mining
· Security and Privacy for IoTt
· Security Models & protocols
· Security Threats & Countermeasures (DDoS MiM Session HijackingReplay attack etc)
· Trusted Computing
· Ubiquitous Computing Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by March 29, 2025. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from NCS 2025 after further revisions will be published in the special issues of the following journals.
· International Journal of Computer Networks & Communications (IJCNC) - Scopus ERA WJCI Indexed
· International Journal of Wireless & Mobile Networks (IJWMN) - ERA WJCI Indexed
· International Journal of Network Security & Its Applications (IJNSA)- ERA WJCI Indexed
· International Journal of Security Privacy and Trust Management (IJSPTM)
· International Journal On Cryptography And Information Security (IJCIS)
· Information Technology in Industry (ITII)
Important Dates
· Submission Deadline:March 29,2025
· Authors Notification:April 12 2025
· Registration & camera - Ready Paper Due:April 19 2025
Contact Us
Here's where you can reach us : [email protected](or) [email protected]
Event Venue & Nearby Stays
Toronto, Canada