CCF推荐学术会议-B(网络与信息安全):ESORICS 2025

ESORICS 2025

Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

所属领域:网络与信息安全

CCF分级:B类

录用率:16.1%(86/535,2024年)

时间地点:2025年9月22日-图卢兹(法国)

截稿时间:2025年4月22日

大会官网:https://esorics2025.sciencesconf.org/

大会主题

·Access Control

·Anonymity and Censorship Resistance

·Artificial Intelligence for Security

·Audit and Accountability

·Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.

·Data and Computation Integrity

·Database Security

·Digital Content Protection

·Digital Forensics

·Formal Methods for Security and Privacy

·Hardware Security

·Information Hiding

·Identity Management

·Information Flow Control

·Information Security (including disinformation/fake news detection)

·Intrusion Detection

·Governance and Management

·Language-based Security

·Malware and Unwanted Software

·Network Security

·Phishing and Spam Prevention

·Privacy Technologies and Mechanisms

·Risk Analysis and Management

·Secure Electronic Voting

·Security Economics and Metrics

·Security and Privacy in Cloud / Fog Systems

·Security and Privacy of Systems based on Machine Learning and A.I.

·Security and Privacy in Crowdsourcing

·Security and Privacy in the IoT and Cyber-Physical Systems

·Security and Privacy in Location-based Services

·Security and Privacy for Mobile / Smartphone Platforms

·Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)

·Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)

·Security and Privacy in Social Networks

·Security and Privacy in Wireless and Cellular Communications

·Software Security

·Systems Security

·Trustworthy Computing to Secure Networks and Systems

·Usable Security and Privacy

·Web Security

相关推荐
纷飞的花火丶35 分钟前
Oracle数据库注入基础入门
网络安全·oracle·sql注入
上海云盾商务经理杨杨7 小时前
2025年电商小程序小量DDoS攻击防护指南:从小流量到大威胁的全面防护方案
网络安全·小程序·ddos
小苑同学11 小时前
PaperReading:《Manipulating Multimodal Agents via Cross-Modal Prompt Injection》
人工智能·网络安全·语言模型·prompt·安全性测试
安达天下20 小时前
Al驱动下的智能网联汽车创新与应用专题培训
网络安全·功能安全·aspice·预期功能安全·安达天下
大有数据可视化1 天前
金融系统的“防火墙”:数字孪生如何模拟风险攻击
网络安全·金融·数字孪生·智慧金融
Bruce_Liuxiaowei1 天前
SOCKS与防火墙:穿透与守护的网络安全协奏曲
网络·安全·web安全·网络安全
零信任Enlink_Young1 天前
企业协同办公平台与零信任安全防护的融合实践
网络安全
emma羊羊1 天前
【CSRF】防御
前端·网络安全·csrf
emma羊羊1 天前
【CSRF】跨站请求伪造
前端·网络安全·csrf
猫耳君1 天前
汽车网络安全 CyberSecurity ISO/SAE 21434 测试之三
安全·web安全·网络安全·汽车·测试·cyber·cybersecurity