CCF推荐学术会议-B(网络与信息安全):ESORICS 2025

ESORICS 2025

Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

所属领域:网络与信息安全

CCF分级:B类

录用率:16.1%(86/535,2024年)

时间地点:2025年9月22日-图卢兹(法国)

截稿时间:2025年4月22日

大会官网:https://esorics2025.sciencesconf.org/

大会主题

·Access Control

·Anonymity and Censorship Resistance

·Artificial Intelligence for Security

·Audit and Accountability

·Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.

·Data and Computation Integrity

·Database Security

·Digital Content Protection

·Digital Forensics

·Formal Methods for Security and Privacy

·Hardware Security

·Information Hiding

·Identity Management

·Information Flow Control

·Information Security (including disinformation/fake news detection)

·Intrusion Detection

·Governance and Management

·Language-based Security

·Malware and Unwanted Software

·Network Security

·Phishing and Spam Prevention

·Privacy Technologies and Mechanisms

·Risk Analysis and Management

·Secure Electronic Voting

·Security Economics and Metrics

·Security and Privacy in Cloud / Fog Systems

·Security and Privacy of Systems based on Machine Learning and A.I.

·Security and Privacy in Crowdsourcing

·Security and Privacy in the IoT and Cyber-Physical Systems

·Security and Privacy in Location-based Services

·Security and Privacy for Mobile / Smartphone Platforms

·Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)

·Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)

·Security and Privacy in Social Networks

·Security and Privacy in Wireless and Cellular Communications

·Software Security

·Systems Security

·Trustworthy Computing to Secure Networks and Systems

·Usable Security and Privacy

·Web Security

相关推荐
Cyyyy_g1 天前
【2025 SWPU-NSSCTF 秋季训练赛】WebFTP
安全·网络安全
平凡的学者1 天前
RustyKey
网络安全·hackthebox
unable code1 天前
攻防世界-Misc-pdf
网络安全·ctf·misc·1024程序员节
Jing_jing_X1 天前
springcloud:理解springsecurity安全架构与认证链路(一)
spring·spring cloud·安全架构
qqxhb1 天前
系统架构设计师备考第65天——安全架构和模型
系统架构·状态机·安全架构·安全模型·物理/信息/网络/系统·blp/biba·chinese wall
平凡而伟大(心之所向)2 天前
云架构设计与实践:从基础到未来趋势
人工智能·阿里云·系统架构·安全架构
是Yu欸2 天前
【博资考5】网安2025
网络·人工智能·经验分享·笔记·网络安全·ai·博资考
jenchoi4132 天前
【2025-11-02】软件供应链安全日报:最新漏洞预警与投毒预警情报汇总
安全·web安全·网络安全
骥龙2 天前
2.4、恶意软件猎手:基于深度学习的二进制文件判别
人工智能·深度学习·网络安全
儒道易行2 天前
【攻防实战】通达OA文件上传联动Cobalt Strike打穿三层内网(下)
网络安全