posted by user: enrico204 || 139 views || tracked by 1 users: [display]

DIMVA 2025 : 22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (cycle 2)

FacebookTwitterLinkedInGoogle

Link: https://www.dimva.org/dimva2025/
 
When Jul 9, 2025 - Jul 11, 2015
Where Graz, Austria
Submission Deadline Feb 12, 2025
Notification Due Apr 2, 2025
Final Version Due Apr 30, 2025
Categories    security   machine learning   MALWARE   vulnerability
 

Call For Papers

General Information

The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). The conference proceedings will appear in the Springer Lecture Notes in Computer Science (LNCS) series.
Topics of Interest

DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics.

Topics of interest include, but are not limited to:
Intrusions

Novel approaches and domains
Insider detection
Prevention and response
Data leakage, exfiltration, and poisoning
Result correlation and cooperation
Evasion and other attacks
Potentials and limitation
Operational experiences
Privacy, legal, and social aspects
Targeted attacks
Analysis or detection of cryptocurrency heists

Malware

Automated analyses
Behavioral models
Prevention and containment
Classification
Lineage
Forensics and recovery
Underground economy
Vulnerabilities in malware
Financially targeted malware (e.g., ransomware, DeFi)

Vulnerability detection

Vulnerability prevention
Vulnerability analysis
Exploitation and defenses
Hardware vulnerabilities
Situational awareness
Active probing
Vulnerabilities in decentralized systems

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough details to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt.

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
dimva 2025   Conference on Detection of Intrusions and Malware & Vulnerability Assessment
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
DIMVA 2024   21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ICSC 2024   The Fourth Intelligent Cybersecurity Conference
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
DDSW 2024   The 5nd International Workshop on Data-Driven Security (DDSW 2024)
SEAS 2025   14th International Conference on Software Engineering and Applications
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science