[Om-announce] Call for Papers - ESORICS 2024

Paria Shirani pshirani at uottawa.ca
Thu Dec 7 17:09:02 CET 2023


----------------------------------------------------------------------------
C a l l     F o r     P a p e r s

29th European Symposium on Research in Computer Security (ESORICS) 2024

16-20 September 2024, Bydgoszcz, Poland
URL: https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fesorics2024.org%2F&data=05%7C01%7C%7C74d66da1b24c40d6d8ff08dbf73f1fa4%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638375622745612063%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ZCuVi8wnb0bhnvLY%2Fz3%2F8p4EEGcck3r50b%2Bi53tXVlM%3D&reserved=0
--------------------------------------------------------------------------

===================
CONFERENCE OUTLINE:
===================

We are looking for papers with high quality, original and unpublished
research contributions. The Symposium will start on September 16, 2024
with an exciting technical program, including vetted papers, invited
talks and collocated workshops.

Important Dates:
-----------------

This year's symposium will have two review cycles. All submissions
must be received by 11:59 p.m. any where on earth Time on the day of
the corresponding deadline.


Winter cycle
* Title and abstract: January 8, 2024 (hard)
* Full paper submission: January 8, 2024 (hard)
* Notification to authors: March 18, 2024
* Camera ready due: June 28, 2024

Spring cycle
* Title and abstract: April 19, 2024 (firm)
* Full paper submission: April 19, 2024 (firm)
* Notification to authors: June 14, 2024
* Camera ready due: June 28, 2024

Abstract submissions:
----------------------
You will need to submit your title and abstract by 11:59 pm, any where
on earth, on the day of the corresponding deadline through the
Symposium's EasyChair websites by following instructions on how to
make a submission (https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Feasychair.org%2Fhelp%2Fhow_to_submit&data=05%7C01%7C%7C74d66da1b24c40d6d8ff08dbf73f1fa4%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638375622745612063%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=4OPrdPn2iAD8el%2F35p%2BLMSyedBpB1kc2vSVqIQnN6Ok%3D&reserved=0).


Paper submissions:
-------------------

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference / workshop with proceedings. The symposium proceedings will
be published by Springer in the Lecture Notes in Computer Science
series (LNCS). In addition, the Journal of Computer Security will
publish a special issue containing selected papers from the ESORICS
2024 proceedings. As in previous years, ESORICS will present a Best
Paper Award chosen by the Program Committee. This award is generously
sponsored by Springer.


How to submit your paper:
-------------------------

Submitted papers must follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions must be uploaded
to the following EasyChair website:

https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Feasychair.org%2Fconferences%2F%3Fconf%3Desorics2024&data=05%7C01%7C%7C74d66da1b24c40d6d8ff08dbf73f1fa4%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638375622745612063%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=T%2B96U9V%2Fa6qwgWMyarbELZJjyDQ3mZRZO6NOW7njIXQ%3D&reserved=0

Only pdf files will be accepted. Submissions are not anonymous.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must agree
with Springer LNCS copyright and guarantee that their papers will be
presented at the conference.


Review Process:
--------------------------------------

This year's symposium will have two review cycles. Within 1.5 month of
submission, author notifications of Accept/Reject decisions will be
sent out. For each submission, one of the following two decisions will
be made:


* Accept: Papers in this category will be accepted for publication in
  the proceedings and presentation at the conference, possibly after
  making minor changes with the oversight of a shepherd.

* Reject: Papers in this category are declined for inclusion in the
  conference. Papers rejected from the first review cycle may not be
  submitted again (even in revised form) to the second review cycle. A
  paper will be judged to be a resubmit (as opposed to a new
  submission) if the paper is from the same or similar authors, and
  there is more than 40% overlap between the original submission and
  the new paper, it will be considered a resubmission.


Topics of Interests:
----------------------

Submissions are solicited in all areas relating to computer security,
including but not limited to:

* Access Control
* Anonymity and Censorship Resistance
* Artificial Intelligence for Security
* Audit and Accountability
* Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
* Data and Computation Integrity
* Database Security
* Digital Content Protection
* Digital Forensics
* Formal Methods for Security and Privacy
* Hardware Security
* Information Hiding
* Identity Management
* Information Flow Control
* Information Security
* Intrusion Detection
* Governance and Management
* Language-based Security
* Malware and Unwanted Software
* Network Security
* Phishing and Spam Prevention
* Privacy Technologies and Mechanisms
* Risk Analysis and Management
* Secure Electronic Voting
* Security Economics and Metrics
* Security and Privacy in Cloud / Fog Systems
* Security and Privacy of Systems based on Machine Learning and A.I.
* Security and Privacy in Crowdsourcing
* Security and Privacy in the IoT and Cyber-Physical Systems
* Security and Privacy in Location-based Services
* Security and Privacy for Mobile / Smartphone Platforms
* Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
* Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
* Security and Privacy in Social Networks
* Security and Privacy in Wireless and Cellular Communications
* Software Security
* Systems Security
* Trustworthy Computing to Secure Networks and Systems
* Usable Security and Privacy
* Web Security


Conflict of Interest (CoI):
----------------------------

The program co-chairs require cooperation from both authors and PC
members to prevent submissions from being evaluated by reviewers who
have a conflict of interest. In the one hand, during the bidding
procedure, PC members will be required to indicate potential CoIs. On
the other hand, authors will be asked during the submission process to
indicate any PC members with whom they share CoIs as well as the types
of CoIs. That is, if they and one the authors 1) share an
institutional affiliation at the time of submission; 2) had at any
time in the past a supervisor/PhD student relationship; 3) have
collaborated or published with in the prior two years; 4) are in some
form of financial relationship, or have been at some point during the
past two years; or 5) are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and
explain the perceived conflict.

Program committee members who have conflicts of interest with a paper,
including program co-chairs, will be excluded from discussing and
reviewing the submission. Authors also need to notify the PC Chairs of
any other reason or circumstance that creates a risk that professional
judgement may be unduly influenced.

The chairs reserve the right to request further explanation and can
remove non-mandatory conflicts at their discretion.


===================
Organizing Team
===================

GENERAL CHAIRS
Michal Choras, Bydgoszcz University of Science and Technology
Sokratis Katsikas, Norwegian University of Science and Technology

PROGRAM CHAIRS
Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
Rafal Kozik, Bydgoszcz University of Science and Technology

PUBLICITY CHAIRS
Paria Shirani, University of Ottawa
Wenjuan Li, Hong Kong Polytechnic University

ORGANIZATION CHAIR
Tomasz Marciniak, Bydgoszcz University of Science and Technology

WORKSHOP CHAIR
Marek Pawlicki, Bydgoszcz University of Science and Technology

SPONSOR CHAIR
Michal Grzybowski, Fundacja Pischingera

WEB CHAIR
Aleksandra Pawlicka, University of Warsaw

PROGRAM COMMITTEE

Massimiliano Albanese, George Mason University
Cristina Alcaraz, University of Malaga
Giovanni Apruzzese, University of Liechtenstein
Mikael Asplund, Linköping University
Vijay Atluri, Rutgers University
Ken Barker, University of Calgary
Giampaolo Bella, University of Catania
Elisa Bertino, Purdue University
Giuseppe Bianchi, Universita di Roma Tor Vergata
Jorge Blasco, Royal Holloway, University of London
Rainer Bohme, University of Innsbruck
Mauro Conti, Padova University
Scott Coull, Mandiant
Bruno Crispo, University of Trento
Nora Boulahia-Cuppens, Polytechnique Montréal
Mila Dalla Preda, University of Verona
Sanchari Das, University of Denver
Sabrina De Capitani di Vimercati, University of Milan
Hervé Debar, Télécom SudParis
Jose Maria de Fuentes, Carlos III University
Roberto Di Pietro, King Abdullah University of Science and Technology
Xuhua Ding, Singapore Management University
Josep Domingo-Ferrer, Universitat Rovira i Virgili
Anna Lisa Ferrara, University of Molise
Olga Gadyatskaya, University of Leiden
Giorgio Giacinto, University of Cagliari
Alberto Giaretta, Orebro University
Dieter Gollmann, Hamburg University of Technology
Lorena Gonzalez-Manzano, Carlos III University
Berk Gulmezoglu, Iowa State University
Hannes Hartenstein, Karlsruhe Institute of Technology
Lucca Hirschi, INRIA
Hugo Jonker, Open University of Netherlands
Stefan Katzenbeisser, University of Passau
Hiroaki Kikuchi, Meiji University
Hyoungshick Kim, Sungkyunkwan University
Jihye Kim, Kookmin University
Marina Krotofil, Maersk
Miroslaw Kutylowski, Wroclaw University of Technology
Alptekin Kupcu, Koç University
Romain Laborde, University Paul Sabatier
Peeter Laud, Cybernetica AS
Maryline Laurent, Telecom SudParis
Giovanni Livraga, University of Milan
Valeria Loscri, Inria
Wenjing Lou, Virginia Tech
Eduard Marin-Fabregas, Telefonica Research
Ivan Martinovic, Oxford University
Wojciech Mazurczyk, Warsaw University of Technology
Chris Mitchell, Royal Holloway
Guillermo Navarro-Arribas, Autonomous University of Barcelona
Antonino Nocera, University of Pavia
Gabriele Oligeri, Hamad Bin Khalifa University
Stefano Paraboschi, Universita di Bergamo
Kai Rannenberg, Goethe University Frankfurt
Peter Y. A. Ryan, University of Luxembourg
Peter Ronne, University of Luxembourg
Pierangela Samarati, University of Milan
David Sanchez, Universitat Rovira i Virgili
Dominique Schroder, University of Erlangen-Nürnberg
Joerg Schwenk, Ruhr-Universitat Bochum
Savio Sciancalepore, Eindhoven University of Technology
Siamak F. Shahandashti, University of York
Claudio Soriente, NEC Laboratories Europe
Alessandro Sorniotti, IBM Zurich
Angelo Spognardi, Sapienza Universita di Roma
Riccardo Spolaor, Shandong University
Thorsten Strufe, Karlsruhe Institute of Technology
Florence Sedes, University Paul Sabatier
Vicenc Torra, Umea University
Daniele Venturi, The Sapienza University of Rome
Haining Wang, Virginia Tech
Edgar Weippl, University of Vienna & SBA Research
Stefano Zanero, Politecnico di Milano
Nicola Zannone, Eindhoven University of Technology
Urko Zurutuza, Mondragon Unibertsitatea

(More to be announced)

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.openmath.org/pipermail/om-announce/attachments/20231207/bd9bc586/attachment-0001.htm>


More information about the Om-announce mailing list