| |||||||||||||||
ESORICS 2025 : European Symposium on Research in Computer Security (round 1) | |||||||||||||||
Link: https://esorics2025.sciencesconf.org/resource/page/id/1 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Seeking submissions of premier, novel, and previously unreleased research papers !
Important Dates 1st round Submission deadline : January 10, 2025 1st round Notification of Acceptance : March 21, 2025 1st round Registration & Camera ready : April 14, 2025 2nd round Submission Deadline : April 22, 2025 2nd round Notification of Acceptance : June 13, 2025 2nd round Camera ready : June 27, 2025 Topics of Interest Submissions are solicited in all areas related to computer security, including but not limited to: Access Control Anonymity and Censorship Resistance Artificial Intelligence for Security Audit and Accountability Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response. Data and Computation Integrity Database Security Digital Content Protection Digital Forensics Formal Methods for Security and Privacy Hardware Security Information Hiding Identity Management Information Flow Control Information Security (including disinformation/fake news detection) Intrusion Detection Governance and Management Language-based Security Malware and Unwanted Software Network Security Phishing and Spam Prevention Privacy Technologies and Mechanisms Risk Analysis and Management Secure Electronic Voting Security Economics and Metrics Security and Privacy in Cloud / Fog Systems Security and Privacy of Systems based on Machine Learning and A.I. Security and Privacy in Crowdsourcing Security and Privacy in the IoT and Cyber-Physical Systems Security and Privacy in Location-based Services Security and Privacy for Mobile / Smartphone Platforms Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports) Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs) Security and Privacy in Social Networks Security and Privacy in Wireless and Cellular Communications Software Security Systems Security Trustworthy Computing to Secure Networks and Systems Usable Security and Privacy Web Security |
|