posted by organizer: ryoichi_isawa || 737 views || tracked by 3 users: [display]

DSC 2024 : IEEE Conference on Dependable and Secure Computing

FacebookTwitterLinkedInGoogle

Link: https://attend.ieee.org/dsc-2024/
 
When Nov 6, 2024 - Nov 8, 2024
Where Tokyo, Japan
Submission Deadline Jul 30, 2024
Notification Due Sep 26, 2024
Categories    cybersecurity   security and privacy   dependable computing   ai security
 

Call For Papers

OVERVIEW
=======
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.


IMPORTANT DATES
============
- Paper submission due: July 30th, 2024 (Extended from July 18, 2024, firmed deadline)
- Paper (Experience and Practice Track) submission due: Aug 29, 2024 (Extended from Aug 22, 2024, firmed deadline)
- Notification of paper acceptance: September 12, 2024
- Workshop paper/poster submission due: September 19, 2017
- Notification of workshop paper/poster acceptance: September 26, 2024
- Camera ready: TBA
- Conference Date: November 6-8, 2024

The time zone of Important Dates is AoE (Anywhere on the Earth) 23:59:59pm.


Main Track: Regular Papers
=================
The DSC conference accepts regular research papers that have no more than 8 pages. Topics of interest include, but are not limited to:
- Advanced Persistent Threat (APT)
- Security Big Data Analysis
- Botnet and Intrusion Detection
- Cryptographic Methods and Toolkits
- Cyber attacks
- Data/Information Reliability
- Database Security and Privacy
- Embedded Systems and IoT Devices
- Experimentation, Measurement, and Assessment
- Mobile and Cloud Computing
- Software vulnerabilities
- Malware analysis
- SDN and NFV
- Security and Privacy for AI
- Hardware security and reliability
- Fault-Tolerant Architectures and Designs
- Industrial Design Experiences
- Security Circuits, Designs, and Detection
- Security and Dependability of Critical Systems


EXPERIENCE and PRACTICE TRACK
======================
The DSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design know-how or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper for peer-review. Topics of interest include, but are not limited to:

- Attacks on Information Systems and/or Digital Information Storage
- CSIRTs, Incident Analysis, and Response
- Honeypots/Honeynets
- Malware Analysis and Reversing
- Mobile Communications Security and Vulnerabilities
- Newly discovered vulnerabilities in software and hardware
- Offensive (and Counter-Offensive) Information Technology
- Reverse Engineering, Forensics, and Anti-Forensics
- Spyware, Phishing and Distributed Attacks
- Data Security and Privacy
- Attacks on model robustness


SUBMISSION INSTRUCTIONS
==================
Papers must be written in English and should not exceed 8 pages for regular papers and 2 pages for experience and practice papers, inclusive of figures, tables, references and appendix using IEEE Conference Proceedings Manuscripts style (two-columns, single-spaced, 10 fonts). The materials presented in the papers should not be published or under submission/review elsewhere. All submitted papers will be peer-reviewed. Accepted papers will appear in the conference proceedings and will be eligible for submission to the IEEE Xplore Digital Library. At least one of the authors of any accepted paper is requested to register the paper at the conference.

Paper templates can be downloaded from IEEE website at ( https://www.ieee.org/conferences/publishing/templates.html ).

All submissions will be made online via their respective web forms.

- Main Track: Regular Papers (HotCRP.com) (at https://dsc24.hotcrp.com/ )
- Experience and Practice Track (HotCRP.com) (at https://dsc24experience.hotcrp.com/ )


Anonymous Submission Guidelines
=====================
The review process will be anonymous. Papers must be submitted in a format that ensures anonymity:

- Do not include author names or affiliations on the title page.
- Review all figures and appendices to ensure no affiliations are accidentally included.
- Refer to your previous work in the third person, as if it was authored by someone else.
- You may include links to websites containing source code, tools, or other supplementary materials, but ensure neither the link nor the website reveal the authors’ identities (e.g., by including names or affiliations).

Papers that are not properly anonymized may be rejected without review.


Ethical Considerations for Paper Submissions
================================
Authors are expected to carefully consider and address any ethical issues associated with their research. This includes potential harms, vulnerabilities, and the treatment of human subjects. Failure to address these concerns adequately may result in rejection of the submission.

- Vulnerability Disclosure: If your research identifies vulnerabilities (e.g., software, hardware, or other systems), you must take steps to avoid harm to affected users. Responsible disclosure to vendors and stakeholders is expected, typically within a 45 to 90-day window prior to publication. Detail the steps taken or planned to address these vulnerabilities in your submission.

- Human Subjects Research: For research involving human subjects or data derived from them, discuss the measures taken to ensure ethical treatment and respect for participants. If your research received approval or waiver from an ethics review board (IRB), please include this information in your submission. If dealing with personal identifiable information (PII) or sensitive data, outline the steps to mitigate potential harms.

- General Ethical Concerns: All submissions should include a clear statement on how ethical and legal concerns were addressed. This is crucial for papers with significant ethical implications or high-impact findings.


ORGANIZERS
=========
General Chairs
- Koji Nakao, NICT, Japan
- Hiroaki Kikuchi, Meiji University, Japan

Program Chairs (Main Track)
- Katsunari Yoshioka, Yokohama National University, Japan
- Takahiro Kasama, NICT, Japan

Program Chair (Experience and Practice Track)
- Ryoichi Isawa, NICT

Publicity Chair
- Daisuke Makita, NICT, Japan

Publication Chair
- Rui Tanabe, Juntendo University, Japan

Workshop Chair
- Akira Fujita, NICT, Japan

Poster Session Chair
- Chansu Han, NICT, Japan

Local Arrangements Chair
- Daisuke Inoue, NICT, Japan

Related Resources

ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
SPPR 2024   13th International Conference on Signal, Image Processing and Pattern Recognition
IEEE CCAI 2025   IEEE--2025 5th International Conference on Computer Communication and Artificial Intelligence (CCAI 2025)
BCYIoT 2024   2nd International Conference on Blockchain, Cybersecurity and Internet of Things
Ei/Scopus-EECT 2025   2025 IEEE 5th International Conference on Advances in Electrical, Electronics and Computing Technology (EECT 2025)
WCICSS 2024   World Congress on Industrial Control Systems Security
ESCI 2025   7th IEEE International Conference on Emerging Smart Computing and Informatics (ESCI-2025) (Hybrid Mode)
CCAI 2025   IEEE--2025 5th International Conference on Computer Communication and Artificial Intelligence (CCAI 2025)
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)