posted by organizer: jgalfaro || 3858 views || tracked by 13 users: [display]

ESORICS 2024 : European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: https://esorics2024.org/
 
When Sep 16, 2024 - Sep 20, 2024
Where Bydgoszcz, Poland
Submission Deadline Jan 8, 2024
Notification Due Mar 18, 2024
Final Version Due Jun 28, 2024
Categories    computer security   privacy   trust   cybersecurity
 

Call For Papers

----------------------------------------------------------------------------
C a l l F o r P a p e r s

29th European Symposium on Research in Computer Security (ESORICS) 2024

16-20 September 2024, Bydgoszcz, Poland
URL: https://esorics2024.org/
--------------------------------------------------------------------------

===================
CONFERENCE OUTLINE:
===================

ESORICS is the annual European research event in Computer Security.

The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

We are looking for papers with high quality, original and unpublished
research contributions. The Symposium will start on September 16, 2024
with an exciting technical program, including vetted papers, invited
talks and collocated workshops.

Important Dates:
-----------------

All submissions must be received by 11:59 p.m. any where on earth Time
on the day of the corresponding deadline.

* Title and abstract: April 19, 2024 (firm)
* Full paper submission: April 19, 2024 (firm)
* Notification to authors: June 14, 2024
* Camera ready due: June 28, 2024

Submission Guidelines:
----------------------

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference / workshop with proceedings. Papers that either lack
originality, clarity in presentation, fall outside the scope of this
call for papers or were already rejected in the first review cycle,
might be rejected without a review. Authors will be promptly informed
in such cases.

Publication Guidelines:
----------------------

The symposium proceedings will be published by Springer in the Lecture
Notes in Computer Science series (LNCS). In addition, we will publish
a special issue containing selected papers from the ESORICS 2024
proceedings. As in previous years, ESORICS will present a Best Paper
Award chosen by the Program Committee. This award is generously sponsored
by Springer.


How to submit your paper:
-------------------------

Submitted papers must follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions must be uploaded
to the following EasyChair website:

https://easychair.org/conferences/?conf=esorics2024

Only pdf files will be accepted. Submissions are not anonymous.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must agree
with Springer LNCS copyright and guarantee that their papers will be
presented at the conference.


Topics of Interests:
----------------------

Submissions are solicited in all areas relating to computer security,
including but not limited to:

* Access Control
* Anonymity and Censorship Resistance
* Artificial Intelligence for Security
* Audit and Accountability
* Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
* Data and Computation Integrity
* Database Security
* Digital Content Protection
* Digital Forensics
* Formal Methods for Security and Privacy
* Hardware Security
* Information Hiding
* Identity Management
* Information Flow Control
* Information Security
* Intrusion Detection
* Governance and Management
* Language-based Security
* Malware and Unwanted Software
* Network Security
* Phishing and Spam Prevention
* Privacy Technologies and Mechanisms
* Risk Analysis and Management
* Secure Electronic Voting
* Security Economics and Metrics
* Security and Privacy in Cloud / Fog Systems
* Security and Privacy of Systems based on Machine Learning and A.I.
* Security and Privacy in Crowdsourcing
* Security and Privacy in the IoT and Cyber-Physical Systems
* Security and Privacy in Location-based Services
* Security and Privacy for Mobile / Smartphone Platforms
* Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
* Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
* Security and Privacy in Social Networks
* Security and Privacy in Wireless and Cellular Communications
* Software Security
* Systems Security
* Trustworthy Computing to Secure Networks and Systems
* Usable Security and Privacy
* Web Security


Conflict of Interest (CoI):
----------------------------

The program co-chairs require cooperation from both authors and PC
members to prevent submissions from being evaluated by reviewers who
have a conflict of interest. In the one hand, during the bidding
procedure, PC members will be required to indicate potential CoIs. On
the other hand, authors will be asked during the submission process to
indicate any PC members with whom they share CoIs as well as the types
of CoIs. That is, if they and one the authors 1) share an
institutional affiliation at the time of submission; 2) had at any
time in the past a supervisor/PhD student relationship; 3) have
collaborated or published with in the prior two years; 4) are in some
form of financial relationship, or have been at some point during the
past two years; or 5) are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and
explain the perceived conflict.

Program committee members who have conflicts of interest with a paper,
including program co-chairs, will be excluded from discussing and
reviewing the submission. Authors also need to notify the PC Chairs of
any other reason or circumstance that creates a risk that professional
judgement may be unduly influenced.

The chairs reserve the right to request further explanation and can
remove non-mandatory conflicts at their discretion.


===================
Organizing Team
===================

GENERAL CHAIRS
Michal Choras, Bydgoszcz University of Science and Technology
Sokratis Katsikas, Norwegian University of Science and Technology

PROGRAM CHAIRS
Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
Rafal Kozik, Bydgoszcz University of Science and Technology

PUBLICITY CHAIRS
Paria Shirani, University of Ottawa
Wenjuan Li, Hong Kong Polytechnic University

ORGANIZATION CHAIR
Tomasz Marciniak, Bydgoszcz University of Science and Technology

WORKSHOP CHAIR
Marek Pawlicki, Bydgoszcz University of Science and Technology

SPONSOR CHAIR
Michal Grzybowski, Fundacja Pischingera

WEB CHAIR
Aleksandra Pawlicka, University of Warsaw

PROGRAM COMMITTEE

Full list available at https://esorics2024.org/pc_members-en

This call for papers and additional information about the conference
can be found at https://esorics2024.org/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ESORICS 2025   European Symposium on Research in Computer Security (round 1)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
FLAIRS 2025   Florida Artificial Intelligence Research Society
MARESEC 2025   European Workshop on Maritime Systems Resilience and Security
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2