CCF推荐学术会议-B(网络与信息安全):ESORICS 2025

ESORICS 2025

Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

所属领域:网络与信息安全

CCF分级:B类

录用率:16.1%(86/535,2024年)

时间地点:2025年9月22日-图卢兹(法国)

截稿时间:2025年4月22日

大会官网:https://esorics2025.sciencesconf.org/

大会主题

·Access Control

·Anonymity and Censorship Resistance

·Artificial Intelligence for Security

·Audit and Accountability

·Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.

·Data and Computation Integrity

·Database Security

·Digital Content Protection

·Digital Forensics

·Formal Methods for Security and Privacy

·Hardware Security

·Information Hiding

·Identity Management

·Information Flow Control

·Information Security (including disinformation/fake news detection)

·Intrusion Detection

·Governance and Management

·Language-based Security

·Malware and Unwanted Software

·Network Security

·Phishing and Spam Prevention

·Privacy Technologies and Mechanisms

·Risk Analysis and Management

·Secure Electronic Voting

·Security Economics and Metrics

·Security and Privacy in Cloud / Fog Systems

·Security and Privacy of Systems based on Machine Learning and A.I.

·Security and Privacy in Crowdsourcing

·Security and Privacy in the IoT and Cyber-Physical Systems

·Security and Privacy in Location-based Services

·Security and Privacy for Mobile / Smartphone Platforms

·Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)

·Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)

·Security and Privacy in Social Networks

·Security and Privacy in Wireless and Cellular Communications

·Software Security

·Systems Security

·Trustworthy Computing to Secure Networks and Systems

·Usable Security and Privacy

·Web Security

相关推荐
枷锁—sha8 小时前
【SRC】SQL注入WAF 绕过应对策略(二)
网络·数据库·python·sql·安全·网络安全
天荒地老笑话么16 小时前
静态 IP 规划:掩码/网关/DNS 的正确组合
网络·网络协议·tcp/ip·网络安全
大方子1 天前
【PolarCTF】rce1
网络安全·polarctf
枷锁—sha1 天前
Burp Suite 抓包全流程与 Xray 联动自动挖洞指南
网络·安全·网络安全
聚铭网络1 天前
聚铭网络再度入选2026年度扬州市网络和数据安全服务资源池单位
网络安全
darkb1rd2 天前
八、PHP SAPI与运行环境差异
开发语言·网络安全·php·webshell
世界尽头与你2 天前
(修复方案)基础目录枚举漏洞
安全·网络安全·渗透测试
乾元2 天前
身份与访问:行为生物识别(按键习惯、移动轨迹)的 AI 建模
运维·网络·人工智能·深度学习·安全·自动化·安全架构
枷锁—sha3 天前
【SRC】SQL注入快速判定与应对策略(一)
网络·数据库·sql·安全·网络安全·系统安全
liann1193 天前
3.1_网络——基础
网络·安全·web安全·http·网络安全