
۳۱ شهریور - ۰۴ مهر ۱۴۰۴
European Symposium On Research In Computer Security
هنوز دنبالکنندهای وجود ندارد.
نمای کلی
The 30th European Symposium on Research in Computer Security (ESORICS) 2025 will be held at Université de Toulouse in Toulouse, France, from September 22 to 26, 2025, with the main conference from September 22-24 and workshops from September 25-26. ESORICS is a prominent European conference on computer security, fostering community and bridging academia and industry, with a focus on AI, machine learning, privacy technologies, network safeguards, and software/hardware protection.
Call for Papers
Seeking submissions of premier, novel, and previously unreleased research papers!
Important Dates
- 1st round Submission deadline: January 10, 2025 (closed)
- 1st round Notification of Acceptance: March 21, 2025 -> March 24, 2025
- 1st round Registration & Camera ready: April 14, 2025
- 2nd round Submission Deadline: April 22, 2025 -> April 29, 2025 (AoE - Anywhere on Earth)
- 2nd round Notification of Acceptance: June 13, 2025 -> June 20, 2025
- 2nd round Camera ready: June 27, 2025 -> July 3, 2025
Paper Submissions
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.
The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). ESORICS will present a Best Paper Award chosen by the Program Committee, generously sponsored by Springer.
How to submit your paper
- Submitted papers must follow the LNCS template from the time they are submitted.
- Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them.
- All submissions must be written in English.
- Submissions must be uploaded to the following EasyChair website: https://easychair.org/conferences/?conf=esorics2025
- Only pdf files will be accepted.
- Submissions are not anonymous.
- Submissions not meeting these guidelines risk rejection without consideration of their merits.
- Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented.
Topics of Interest
Submissions are solicited in all areas related to computer security, including but not limited to:
- Access Control
- Anonymity and Censorship Resistance
- Artificial Intelligence for Security
- Audit and Accountability
- Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
- Data and Computation Integrity
- Database Security
- Digital Content Protection
- Digital Forensics
- Formal Methods for Security and Privacy
- Hardware Security
- Information Hiding
- Identity Management
- Information Flow Control
- Information Security (including disinformation/fake news detection)
- Intrusion Detection
- Governance and Management
- Language-based Security
- Malware and Unwanted Software
- Network Security
- Phishing and Spam Prevention
- Privacy Technologies and Mechanisms
- Risk Analysis and Management
- Secure Electronic Voting
- Security Economics and Metrics
- Security and Privacy in Cloud / Fog Systems
- Security and Privacy of Systems based on Machine Learning and A.I.
- Security and Privacy in Crowdsourcing
- Security and Privacy in the IoT and Cyber-Physical Systems
- Security and Privacy in Location-based Services
- Security and Privacy for Mobile / Smartphone Platforms
- Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
- Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
- Security and Privacy in Social Networks
- Security and Privacy in Wireless and Cellular Communications
- Software Security
- Systems Security
- Trustworthy Computing to Secure Networks and Systems
- Usable Security and Privacy
- Web Security
Conflict of Interest (CoI)
The program co-chairs require cooperation from both authors and PC members to prevent submissions from being evaluated by reviewers who have a conflict of interest. In the one hand, during the bidding procedure, PC members will be required to indicate potential CoIs. On the other hand, authors will be asked during the submission process to indicate any PC members with whom they share CoIs as well as the types of CoIs. That is, if they and one the authors 1) share an institutional affiliation at the time of submission; 2) had at any time in the past a supervisor/PhD student relationship; 3) have collaborated or published with in the prior two years; 4) are in some form of financial relationship, or have been at some point during the past two years; or 5) are related, or have close personal friendships. For other forms of conflict, authors must contact the chairs and explain the perceived conflict. Program committee members who have conflicts of interest with a paper, including program co-chairs, will be excluded from discussing and reviewing the submission. Authors also need to notify the PC Chairs of any other reason or circumstance that creates a risk that professional judgement may be unduly influenced. The chairs reserve the right to request further explanation and can remove non-mandatory conflicts at their discretion.
تاریخهای کنفرانس
Conference Date
۳۱ شهریور ۱۴۰۴ → ۴ مهر ۱۴۰۴
ارسال مقاله
1st round Submission deadline
۲۱ دی ۱۴۰۳
2nd round Submission Deadline
۹ اردیبهشت ۱۴۰۴
اعلان
1st round Notification of Acceptance
۴ فروردین ۱۴۰۴
2nd round Notification of Acceptance
۳۰ خرداد ۱۴۰۴
نسخه نهایی
1st round Registration & Camera ready
۲۵ فروردین ۱۴۰۴
2nd round Camera ready
۱۲ تیر ۱۴۰۴
- ۶ تیر ۱۴۰۴
رتبه منبع
منبع: CORE2023
رتبه: A
حوزه پژوهشی: Cybersecurity and privacy