<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="10.40">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="format-detection" content="telephone=no">
<title>Call for Papers: ARES 2018, Deadline Extension</title>
</head>
<body>
<p align="center"><strong>ARES 2018 - CALL FOR PAPERS - Extended Deadline until March 30, 2018<br>
</strong></p>
<p align="center"><strong>******************************************************************************************<br>
The 13th International Conference on Availability, Reliability and Security (ARES 2018)<br>
August 27 - August 30, 2018, Hamburg, Germany<br>
</strong><a href="http://www.ares-conference.eu"><strong>http://www.ares-conference.eu</strong></a><br>
<strong>******************************************************************************************</strong></p>
<p align="center">ICS-CSR 2018 (<a href="https://ics-csr.com/">https://ics-csr.com/</a>) & CD-MAKE 2018 (<a href="https://cd-make.net/">https://cd-make.net/</a>) co-located with ARES!
</p>
<p>***********<br>
ARES CONFERENCE<br>
************<br>
The 13th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability
– with special focus on the crucial linkage between availability, reliability and security.</p>
<p>ARES is ranked as B-conference in CORE. Qualis (backed by Brazilian Ministry) ranked ARES and Esorics as leading security conference in Europe (A2).</p>
<p>Selected papers that are accepted by and presented at the ARES Conference will be published, after further revision, in special issues of international journals (e.g. Springer EURASIP Journal on Information Security). The acceptance rate of the ARES 2017
conference was 24% (full papers only). ARES 2017 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).</p>
<p>************<br>
HIGHLIGHTS<br>
************<br>
<strong>Confirmed Keynote Speakers:</strong> </p>
<p>- Joan Daemen, Radboud University, Security Architect at ST Microelectronics</p>
<p>- Klaus-Robert Müller, Machine Learning Group TU Berlin, MPI for Informatics, Saarbrücken, and Korea University, Seoul</p>
<p><span style="FONT-SIZE: 12pt; mso-fareast-font-family: "Times New Roman"">Social Events: We are looking</span><span style="FONT-SIZE: 12pt; mso-fareast-font-family: "Times New Roman""> forward to taking you on an evening cruise leading from the impressive
harbor area through the narrow canals of the famous Speicherstadt. Another highlight will be this year´s conference dinner taking place right at the heart of Hamburg´s historical port area. The masonry of the Experience Warehouse combines comfort with the
flair of ancient merchant tradition. You will also get the chance to experience the worldwide known
<a href="https://www.miniatur-wunderland.com/">Miniature Wonderland</a>.</span></p>
<p>************<br>
CONFERENCE OFFICERS<br>
************<br>
General Chairs 2018<br>
Mathias Fischer, Universität Hamburg, Germany<br>
Dominik Herrmann, Universität Hamburg, Germany</p>
<p>Program Committee Chairs 2018<br>
Christian Doerr, TU Delft, Netherlands<br>
Sebastian Schrittwieser, FH St. Pölten, Austria</p>
<p>************<br>
IMPORTANT DATES<br>
************<br>
Submission Deadline: extended to <strong>March 30, 2018</strong> 23:59 UTC-11<br>
Author Notification: May 30, 2018<br>
Proceedings Version: June 29, 2018<br>
Conference: August 27 - August 30, 2018</p>
<p>************<br>
SUBMISSION<br>
************<br>
ARES 2018 will be published by the International Conference Proceedings Series published by ACM (ACM ICPS).</p>
<p>Authors are invited to submit research and application papers according the following guidelines: two columns, single-spaced, including figures and references, using 10 pt fonts and number each page.</p>
<p>For the main conference as well as the workshops submission papers are classified into 3 categorizes representing original, previously unpublished work:<br>
-full paper (10 pages)<br>
-short paper (6 pages)<br>
-workshop paper (8 pages, a maximum of 10 pages is tolerated)</p>
<p>The ARES submission system (EasyChair) is available here: <a href="https://easychair.org/conferences/?conf=ares2018">
https://easychair.org/conferences/?conf=ares2018</a><br>
More information can be found here:</p>
<p>************<br>
PROGRAM COMMITTEE<br>
************<br>
Isaac Agudo Ruiz, University of Malaga, Spain<br>
Todd R. Andel, University of South Alabama, United States<br>
Abdelmalek Benzekri, University of Toulouse, France<br>
Francesco Buccafurri, University of Reggio Calabria, Italy<br>
Lasaro Camargos, Federal University of Uberlândia, Brazil<br>
David Chadwick, University of Kent, United Kingdom<br>
Nathan Clarke, Plymouth University, United Kingdom<br>
Jörg Daubert, TU Darmstadt, Germany<br>
Luca De Cicco, Politecnico di Bari, Italy<br>
José Maria de Fuentes, Carlos III University of Madrid, Spain<br>
Pavlos Efraimidis Democritus, University of Thrace, Greece<br>
Dominik Engel, Salzburg University of Applied Sciences, Austria<br>
Christian Engelmann, Oak Ridge National Laboratory, United States<br>
Hannes Federrath, University of Hamburg, Germany<br>
Christophe Feltus, Luxembourg Institute of Science and Technology, Luxembourg<br>
Umberto Ferraro Petrillo, Universitá degli studi di Roma – La Sapienza, Italy<br>
Steven Furnell, Plymouth University, United Kingdom<br>
Joaquin Garcia-Alfaro, Télécom SudParis, France<br>
Karl Goeschka, Vienna University of Technology, Austria<br>
Lorena Gonzalez-Manzano, Carlos III University of Madrid, Spain<br>
Bogdan Groza, Politehnica University of Timisoara, Romania<br>
Sheikh Mahbub Habib, TU Darmstadt, Germany<br>
Dominik Herrmann, University Hamburg, Germany<br>
Martin Gilje Jaatun, SINTEF, Norway<br>
Jan Jürjens, TU Dortmund and Fraunhofer ISST, Germany<br>
Anatoli Kalysch, Friedrich-Alexander University Erlangen-Nuremberg, Germany<br>
Sokratis K. Katsikas, NTNU: Norwegian University of Science and Technology, Norway<br>
Peter Kieseberg, SBA Research, Austria<br>
Ralf Kuesters, University of Stuttgart, Germany<br>
Oksana Kulyk, TU Darmstadt, Germany<br>
Romain Laborde, University of Toulouse, France<br>
Costas Lambrinoudakis, University of Piraeus, Greece<br>
Shujun Li, University of Surrey, United Kingdom<br>
Giovanni Livraga, Universita’ degli Studi di Milano, Italy<br>
Robert Luh, Institute of IT Security Research, Austria<br>
Keith Martin, Royal Holloway, University of London, United Kingdom<br>
Barbara Masucci, University of Salerno, Italy<br>
Ioannis Mavridis, University of Macedonia, Greece<br>
Wojciech Mazurczyk, Warsaw University of Technology, Poland<br>
Mattia Monga, Universita` degli Studi di Milano, Italy<br>
Haralambos Mouratidis, University of Brighton, United Kingdom<br>
Thomas Nowey, Krones AG, Germany<br>
Jaehong Park, University of Alabama in Huntsville, United States<br>
Günther Pernul, University of Regensburg, Germany<br>
Stefanie Rinderle-Ma, Vienna University, Austria<br>
Michael Roßberg, TU Ilmenau, Germany<br>
Volker Roth, Freie Universität Berlin, Germany<br>
Giovanni Russello, University of Auckland, New Zealand<br>
Mark Scanlon, University College Dublin, Ireland<br>
Sebastian Schinzel, FH Münster, Germany<br>
Jörn-Marc Schmidt, Secunet, Germany<br>
Max Schuchard, University of Minnesota, United States<br>
Stefan Schulte, Vienna University of Technology, Austria<br>
Daniele Sgandurra, Royal Holloway, University of London, United Kingdom<br>
Jon A. Solworth, University of Illinois at Chicago, United States<br>
Jordi Soria-Comas, Universitat Rovira i Virgili, Spain<br>
Mark Strembeck, WU Vienna, Austria<br>
Jakub Szefer, Yale University, United States<br>
Oliver Theel, Carl von Ossietzky Universität Oldenburg, Germany<br>
Simon Tjoa, St. Pölten University of Applied Sciences, Austria<br>
Emmanouil Vasilomanolakis, TU Darmstadt Germany<br>
Umberto Villano, Universita’ del Sannio, Italy<br>
Corrado Aaron, Visaggio Univeristà del Sannio, Italy<br>
Xiao Wang, Carnegie Mellon University, United States<br>
Christos Xenakis, University of Piraeus, Greece<br>
Nicola Zannone, Eindhoven University of Technology, Netherlands</p>
<p>***********<br>
TOPCIS of interest include, but are not limited to:<br>
************<br>
Authorization, Authentication, and Access Control<br>
Availability, Dependability, and Resilience<br>
Botnets and Botnet Monitoring<br>
Business Continuity & Resilience<br>
Cost/Benefit Analysis<br>
Cryptography<br>
Dependability Aspects for Special Applications<br>
Dependability Aspects of e-Government<br>
Dependability and Resilience in Open Source Software<br>
Designing Security Requirements<br>
Digital Forensics<br>
E-Commerce Dependability<br>
Identity Management<br>
IPR of Security Technology<br>
Incident Response and Prevention<br>
Information Flow Control<br>
Information Hiding and Steganograhpy<br>
Interoperability Aspects<br>
Intrusion Detection and Fraud Detection<br>
Legal Issues related to Security and Privacy<br>
Mobile Security<br>
Network and Organizational Vulnerability Analysis<br>
Network Security<br>
Privacy-Enhancing Technologies<br>
Process based Security Models and Methods<br>
Resilience and Security for Critical Infrastructures<br>
Resilience of Computing Systems<br>
Resilience, Security, and Privacy for Smart Grids<br>
Resilience, Security, and Privacy for the Internet of Things<br>
RFID Security and Privacy<br>
Risk planning, Analysis & Awareness<br>
Safety Critical Systems<br>
Secure Enterprise Architectures<br>
Security and Privacy for Ubiquitous Systems<br>
Security and Privacy in E-Health<br>
Security and Trust Management in P2P and Grid applications<br>
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications<br>
Security and Usability<br>
Security as Quality of Service<br>
Security in Distributed Systems / Distributed Databases<br>
Security in Electronic Payments<br>
Security in Electronic Voting<br>
Software Engineering of Dependable Systems<br>
Software Security<br>
Threats and Attack Modelling<br>
Trusted Computing<br>
Tools for Dependable System Design and Evaluation<br>
Trust Models and Trust Management<br>
Wireless Security</p>
</body>
</html>