Call for Papers

2022 9th International Conference on Networking, Systems and Security (9th NSysS 2022) aims to provide a forum for researchers, practitioners, developers, and users to exchange new ideas and results related to computer networks and networking systems and security across academia and industry. 9th NSysS 2022 will be held during December 20-22, 2022, in Dhaka, the capital of Bangladesh (or in Cox’s Bazar in case of a physical event). This conference series is generally technically co-sponsored by BUET ACM Chapter.

Important Dates

Abstract and full paper submission deadline: August 14 August 31, 2022 (Extended and Final)
Notification of full paper acceptance: October 20, 2022
Short paper submission deadline: August 14 August 31, 2022 (Extended and Final)
Notification of short paper acceptance: October 20, 2022
Camera-ready content submission: October 27, 2022
Poster submission deadline: November 5, 2022 (Extended and Final)
Notification of poster acceptance: November 15, 2022
Program: December 20-22, 2022

Scope

Scope of the conference includes, but is not limited to, the following:

Network and Communication System Design

Wireless, mobile, ad-hoc, and sensor networks; Network theory; Network science; Networking layers and protocols; Future internet design; Multicast, broadcast and anycast; Multimedia protocols; Network architectures; Network management and traffic engineering; Network function virtualization (NFV); Network simulation and emulation; Optical networks; Quality of service; Resource allocation and management; Satellite networks; Software-defined networking (SDN);  Topology characterization and inference; Cellular and broadband wireless nets; Cognitive radio networking; Congestion control;  Cross-layer design and optimization; Data reduction, inference, and signal processing; Delay/disruption tolerant networks;  Experimental results from operational networks or network applications; Near field communication; Novel components, devices and architectures for networked sensing; P2P, overlay, and content distribution networks; RFID networks and protocols; Self-organizing networks

System Security

Anti-malware techniques: detection, analysis, and prevention; Cyber-crime defense and forensics; Security for future Internet architectures and designs; Implementation, deployment and management of network security policies; Integrating security in network protocols; Cyber attack prevention, detection, investigation, and response; Software/firmware analysis, customization, and transformation for systems security; Privacy and anonymity in networks and distributed systems; Security and privacy for blockchains and cryptocurrencies; Security for cloud/edge computing; Security and privacy of mobile/smartphone platforms; Security for cyber-physical systems; Security for emerging networks; Security for large-scale, critical infrastructures; Security of web-based applications and services; Usable security and privacy; Trustworthy computing software and hardware to secure networks and systems

Application-specific System Design

Smart grid; Mobile health; Transportation; Smart city; Manufacturing; Blockchain; Mobile, participatory, and social sensing; IoT and sensor Technology; Underground and underwater networks; Vehicular networks 

ML/AI for Systems

Data-driven system design, Big data analytics; Machine learning, data mining, and applications (e.g., cyber security, healthcare and networks); Natural language processing (NLP) for systems; Security and privacy of systems based on machine learning and AI 

Computing Systems

Computer architecture; Cyber physical systems and networking; Operating systems and runtime environments; Cloud and distributed systems; Data centers

Low Power System

Energy harvesting; Energy optimization; Power control and management; Low-power, power-aware, and thermal-aware system design; Energy-efficient, energy-aware, and thermal-aware software and application design

HCI System Development

Human computer interaction; Social computing and networks; Hardware, architectures, infrastructures, interaction design, technical foundations, algorithms to build new social and collaborative systems and experiences 

Author Instructions

Authors are invited to submit full and short papers describing original research of theoretical or practical significance to Networking, Systems and Security. Submitted full papers and short papers must describe work not previously published. They must not be submitted simultaneously to another conference with refereed proceedings or to a journal. Full Papers should not exceed 10 pages (double column) and short papers should not exceed 6 pages (double column) in ACM format. Papers must be submitted in PDF format and formatted according to the new Standard ACM Conference Proceedings Template.

Information about formatting and style files is available online at https://www.acm.org/publications/proceedings-template.

The Overleaf template is available online at https://www.overleaf.com/latex/templates/acm-conference-proceedings-primary-article-template/wbvnghjbzwpc.

LaTex users have to use sample-sigconf.tex file as the template. If you prefer to use the Overleaf template, change the main document to sample-sigconf.tex file.

Word users have to use interim-layout.docx file as the template.

Only electronic submissions will be allowed. All papers submitted to 9th NSysS 2022 need to be double-blind, i.e., no author name should appear in the submitted papers.

Paper Submission Link

Proceedings

Technical Co-Sponsorship