ESORICS 2025
Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.
所属领域:网络与信息安全
CCF分级:B类
录用率:16.1%(86/535,2024年)
时间地点:2025年9月22日-图卢兹(法国)
截稿时间:2025年4月22日
大会官网:https://esorics2025.sciencesconf.org/
大会主题
·Access Control
·Anonymity and Censorship Resistance
·Artificial Intelligence for Security
·Audit and Accountability
·Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
·Data and Computation Integrity
·Database Security
·Digital Content Protection
·Digital Forensics
·Formal Methods for Security and Privacy
·Hardware Security
·Information Hiding
·Identity Management
·Information Flow Control
·Information Security (including disinformation/fake news detection)
·Intrusion Detection
·Governance and Management
·Language-based Security
·Malware and Unwanted Software
·Network Security
·Phishing and Spam Prevention
·Privacy Technologies and Mechanisms
·Risk Analysis and Management
·Secure Electronic Voting
·Security Economics and Metrics
·Security and Privacy in Cloud / Fog Systems
·Security and Privacy of Systems based on Machine Learning and A.I.
·Security and Privacy in Crowdsourcing
·Security and Privacy in the IoT and Cyber-Physical Systems
·Security and Privacy in Location-based Services
·Security and Privacy for Mobile / Smartphone Platforms
·Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
·Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
·Security and Privacy in Social Networks
·Security and Privacy in Wireless and Cellular Communications
·Software Security
·Systems Security
·Trustworthy Computing to Secure Networks and Systems
·Usable Security and Privacy
·Web Security