|
Last Modified:12/16/24
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
Elsevier Online
Social Networks and Media Journal (OSNEM), Special issue on
Disinformation, toxicity, harms in Online Social Networks and Media.
(Submission Due 31 March 2025) [posted here 1/20/25]
Guest Editors: Marco Conti (IIT-CNR, Italy), Andrea Passarella (IIT-CNR, Italy),
and Arkaitz Zubiaga (Queen Mary University of London, UK)
Online Social Networks and Media have revolutionized society, and are now a key part
of how most people work, live, socialize, find information and entertain themselves. But whilst they
have generated huge benefits, leading to unprecedented connectivity across the globe, online social
networks have also enabled the spread of hazardous and dangerous behaviours. Chiefly, this is generated
by disinformation campaign and fake news, generation and spread of toxic content, deliberate or
unconscious generation and spreading of harmful content. Generative AI is exponentially exacerbating
the diffusion of toxic content, while, quite interestingly, not being equally used to counteract
harmful behaviours. On the other hand, content moderation techniques are emerging, aiming at providing
practical tools to fight against online harms driven by toxic content.
This special issue seeks high-quality scientific articles which examine, via a data-driven
approach, the emergence of harmful behaviours in OSNEM, as well as tools and methods to
fight against them. We particularly encourage papers which focus on online hate, misinformation,
disinformation, toxic content. Data-driven approaches, supported by existing or new publicly
available datasets, are strongly encouraged.
For more information, please see
https://www.sciencedirect.com/journal/online-social-networks-and-media.
January 2025
DFRWS-USA 2025
25th Annual Digital Forensics Research Conference,
Chicago, Illinois, USA, July 22-25, 2025.
(Submission Due 31 January 2025) [posted here 11/4/24]
DFRWS conferences feature thought provoking Keynote Speakers, hands-on workshops, cutting edge
research papers, presentations, panel discussions, demonstrations and poster sessions accompanied by a
full schedule of social events including a Welcome Reception, the DFRWS Digital Forensics Rodeo and an
expedition. All presentations take place in-person but virtual registrations will be available for
those who are not able to attend the conference in person but wish to participate in this historic event.
FULL RESEARCH PAPERS undergo double-blinded peer review, and the proceedings are published by
Elsevier as a special issue of the Journal of Forensic Science International: Digital Investigation.
We ask to submit articles according to the submission instructions.
Systematization of Knowledge (SoK) Papers: As this marks the 25th occurrence of the conference, a substantial
body of knowledge has been published through this platform over the years. Therefore, starting from this year,
we solicit Systematization of Knowledge (SoK) papers that systematize, contextualize and evaluate existing
knowledge of digital forensics. A suitable SoK paper needs to provide unique insights, such as a new
viewpoint, a comprehensive taxonomy, and new evidence in supporting or challenging long-held beliefs.
A survey paper without such insights is not appropriate and may be rejected without full review.
A SoK paper submission needs to have the prefix ÒSoK: Ó in the title, and select the checkbox in
the submission form. Accepted SoK papers will be presented at the conference and included
in the proceedings.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2025/.
WEIS 2025
24th Annual Workshop on the Economics of Information Security,
Tokyo, Japan, Jun 23-25, 2025.
(Submission Due 31 January 2025) [posted here 1/13/25]
The workshop accepts papers covering both theoretical and empirical
studies of the interrelationship between information security (broadly
construed, particularly to include privacy, cybercriminality and
cyber-warfare) and economics (including financial incentives,
behavioural economics, cyberinsurance). Market failures,
market-induced technical failures, and cost analyses of investment in
cybersecurity versus falling victim to cybercrime, have all been
covered in past workshops. We encourage participation by submission of paper and attendance by
economists, computer scientists, legal scholars, business researchers
(from academia and elsewhere), and security and privacy researchers
from academia and industry to submit research on relevant topics.
For more information, please see
http://kmlabcw.iis.u-tokyo.ac.jp/weis/2025/index.html.
WNDSS 2025
International Workshop on Network and Distributed Systems Security,
Co-located with the 40th International Information Security and Privacy
Conference (IFIP SEC 2025),
Maribor, Slovenia, May 23, 2025.
(Submission Due 31 January 2025) [posted here 1/13/25]
The workshop is organized by IFIP Working Group 11.4 ÒNetwork &
Distributed Systems SecurityÓ. The aim of the workshop is to provide a
forum for discussion among researchers, practitioners, regulators,
students, and any other interested parties. The scope of the workshop
covers the security of computer networks and of distributed systems.
Beyond technical papers and papers presenting the results of completed
research, also work-in-progress papers, position papers, survey
papers, and papers discussing non-technical aspects are of interest.
The best student paper will receive an award.
For more information, please see
https://ifiptc11.org/wg114-events/wg114-workshop/.
February 2025
CSF 2025
38th IEEE Computer Security Foundations Symposium,
Santa Cruz, CA, USA, June 16-20, 2025.
(Submission Due 28 May 2024, 1 October 2024, and 4 February 2025) [posted here 10/1/24]
The Computer Security Foundations Symposium (CSF) is an annual conference for
researchers in computer security, to examine current theories of security, the formal models that
provide a context for those theories, and techniques for verifying security. It was created in 1988
as a workshop of the IEEE Computer SocietyÕs Technical Committee on Security and Privacy, in response
to a 1986 essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó The meeting
became a ÒsymposiumÓ in 2007, along with a policy for open, increased attendance. Over the past two
decades, many seminal papers and techniques have been presented first at CSF. For more details on the
history of the symposium, visit CSFÕs home.
The program includes papers, panels, and a poster session. Topics of interest include access control,
information flow, covert channels, cryptographic protocols, database security, language-based security,
authorization and trust, verification techniques, integrity and availability models, and broad discussions
concerning the role of formal methods in computer security and the nature of foundational research
in this area.
For more information, please see
https://csf2025.ieee-security.org.
IWSPA 2025
11th ACM International Workshop on Security and Privacy Analytics,
Co-located with ACM CODASPY 2025,
Pittsburgh, Pennsylvania, June 6, 2025.
(Submission Due 7 February 2025) [posted here 1/13/25]
The goal of this workshop is to bring leaders in security and privacy
fields together from across the globe.
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural
language processing are being applied to challenges in security and privacy fields. However,
experts from these areas have no medium where they can meet and exchange ideas so that strong
collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current
courses and curricula in security do not sufficiently emphasize background in these areas and
students in security and privacy are not emerging with deep knowledge of these topics.
Hence, we propose a workshop that will address the research and development efforts in which
analytical techniques from machine learning, data mining, natural language processing and
statistics are applied to solve security and privacy challenges (Òsecurity analyticsÓ).
Submissions of papers related to methodology, design, techniques and new directions for
security and privacy that make significant use of machine learning, data mining, statistics
or natural language processing are welcome. Furthermore, submissions on educational topics
and systems in the field of security analytics are also highly encouraged.
For more information, please see
https://sites.google.com/view/iwspa-2025.
WTMC 2025
10th International Workshop on Traffic Measurements for Cybersecurity,
Co-located with the 10th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2025),
Venice, Italy, June 30, 2025.
(Submission Due 10 February 2025) [posted here 1/20/25]
Current communication networks are increasingly becoming pervasive, complex,
and ever-evolving due to factors like enormous growth in the number of network users,
continuous appearance of network applications, increasing amount of data transferred, and
diversity of user behavior. Understanding and measuring traffic in such networks is a
challenging yet vital task for network management but recently also for cybersecurity
purposes. Network traffic measurement and monitoring can, for example, enable the analysis
of the spreading of malicious software and its capabilities or can help to understand the
nature of various network threats, including those that exploit user's behavior and other
user's sensitive information. On the other hand, network traffic investigation can also
help to assess the effectiveness of the existing countermeasures or contribute to building
new, better ones. Traffic measurements have been utilized in the area of economics of
cybersecurity e.g., to assess ISP ÒbadnessÓ or to estimate the revenue of cybercriminals.
Recent research has focused on measurements of fake news and the interplay between
misinformation and user engagement in news postings using different online platforms.
Additionally, recent studies have explored measurements of generative AI's role in cybersecurity,
highlighting its dual potential to bypass security measures in cyberattacks and strengthen
defense mechanisms against evolving threats.
The WTMC workshop aims to bring together the research accomplishments provided by researchers
from academia and the industry. The other goal is to show the latest research results in the
field of cybersecurity and understand how traffic measurements can influence it. We encourage
prospective authors to submit related distinguished research papers on the subject of both
theoretical approaches and practical case reviews. This workshop presents some of the most
relevant ongoing research in cybersecurity seen from the traffic measurements perspective.
For more information, please see
https://wtmc.info/index.html.
PETS 2025
25th Privacy Enhancing Technologies Symposium,
Washington, DC and Online, July 14-19, 2025.
(Submission Due 31 May 2024, 31 August 2024, 30 November 2024, and 28 February 2025) [posted here 7/22/24]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts
from around the world to present and discuss recent advances and new perspectives on research in
privacy technologies. The 25th PETS will be a hybrid event with a physical gathering held in
Washington, DC, USA and a concurrent virtual event. Papers undergo a journal-style reviewing process,
and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).
Authors of accepted papers are encouraged to attend and present at the physical event, where their
presentations can be recorded for the virtual event and where they can participate directly in
in-person research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality
reviewing and publication while also supporting the successful PETS community event. PoPETs is
self-published and does not have article processing charges or article submission charges.
For more information, please see
https://petsymposium.org/cfp25.php.
ARES 2025
20th International Conference on Availability, Reliability and Security,
Ghent, Belgium, August 10-13, 2025.
(Submission Due 28 February 2025) [posted here 12/23/24]
ARES highlights the various aspects of dependability Ð with special focus
on the crucial linkage between availability, reliability and security. ARES aims at a full
and detailed discussion of the research issues of dependability as an integrative concept
that covers amongst others availability, safety, confidentiality, integrity, maintainability
and security in the different fields of applications. ARES emphasizes the interplay between
foundations and practical issues of dependability in emerging areas such as e-government,
m-government, location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination and research
challenges of the various aspects of Dependable Computing and the definition of a future road map.
The ARES 2025 proceedings will be published in Springer Lecture Notes on Computer Science.
For more information, please see
https://2025.ares-conference.eu/.
March 2025
ACM WiSec 2025
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Arlington, Virginia, USA, June 30 - July 3, 2025.
(Submission Due 26 November 2024 and 12 March 2025) [posted here 10/14/24]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security
and privacy in wireless and mobile networks and their applications. In addition to the traditional
ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the
increasingly diverse range of mobile or wireless applications such as the Internet of Things,
Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable
security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software
vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion,
jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols,
cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA),
wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment
applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization,
remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices,
wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT,
Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites),
and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications,
sonic, underwater communications, legacy telecommunications, É
For more information, please see
https://wisec2025.gmu.edu.
April 2025
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
(Submission Due 9 January 2025 and 14 April 2025) [posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
ESORICS 2025
30th European Symposium on Research in Computer Security,
Toulouse, France, September 22-26, 2025.
(Submission Due 10 January 2025 and 22 April 2025) [posted here 12/30/24]
Computer security is concerned with the protection of information in environments
where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further
the progress of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European nations, the
symposium has solidified its position as one of Europe's most prominent conferences on computer
security. Currently, the symposium delves into research and developmental avenues encompassing
AI, machine learning, technologies that enhance privacy, network safeguards, software and
hardware protection in practical scenarios.
For more information, please see
https://www.esorics2025.org/.
May 2025
June 2025
July 2025
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|