CCF推荐学术会议-B(网络与信息安全):ESORICS 2025

ESORICS 2025

Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

所属领域:网络与信息安全

CCF分级:B类

录用率:16.1%(86/535,2024年)

时间地点:2025年9月22日-图卢兹(法国)

截稿时间:2025年4月22日

大会官网:https://esorics2025.sciencesconf.org/

大会主题

·Access Control

·Anonymity and Censorship Resistance

·Artificial Intelligence for Security

·Audit and Accountability

·Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.

·Data and Computation Integrity

·Database Security

·Digital Content Protection

·Digital Forensics

·Formal Methods for Security and Privacy

·Hardware Security

·Information Hiding

·Identity Management

·Information Flow Control

·Information Security (including disinformation/fake news detection)

·Intrusion Detection

·Governance and Management

·Language-based Security

·Malware and Unwanted Software

·Network Security

·Phishing and Spam Prevention

·Privacy Technologies and Mechanisms

·Risk Analysis and Management

·Secure Electronic Voting

·Security Economics and Metrics

·Security and Privacy in Cloud / Fog Systems

·Security and Privacy of Systems based on Machine Learning and A.I.

·Security and Privacy in Crowdsourcing

·Security and Privacy in the IoT and Cyber-Physical Systems

·Security and Privacy in Location-based Services

·Security and Privacy for Mobile / Smartphone Platforms

·Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)

·Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)

·Security and Privacy in Social Networks

·Security and Privacy in Wireless and Cellular Communications

·Software Security

·Systems Security

·Trustworthy Computing to Secure Networks and Systems

·Usable Security and Privacy

·Web Security

相关推荐
塔子终结者6 小时前
网络安全A模块专项练习任务十解析
java·服务器·网络安全
2301_780789667 小时前
渗透测试与网络安全审计的关系
网络·数据库·安全·web安全·网络安全
王火火(DDoS CC防护)8 小时前
服务器IP暴露被攻击了怎么办?
服务器·网络安全·ddos攻击
2401_8653825011 小时前
各省市信息化项目管理办法中的网络安全等级保护如何规定的?
网络安全·信息化项目·项目审批
墨染 殇雪19 小时前
文件上传漏洞基础及挖掘流程
网络安全·漏洞分析·漏洞挖掘·安全机制
网络安全大学堂19 小时前
【网络安全入门基础教程】网络安全零基础学习方向及需要掌握的技能
网络·学习·安全·web安全·网络安全·黑客
君君思密达1 天前
网络安全初级-渗透测试
安全·网络安全
网安INF1 天前
【论文阅读】-《Besting the Black-Box: Barrier Zones for Adversarial Example Defense》
人工智能·深度学习·网络安全·黑盒攻击
lingggggaaaa1 天前
小迪安全v2023学习笔记(七十七讲)—— 业务设计篇&隐私合规检测&重定向漏洞&资源拒绝服务
笔记·学习·安全·web安全·网络安全
Suckerbin1 天前
Corrosion: 1靶场渗透
笔记·安全·网络安全