posted by organizer: jgalfaro || 1189 views || tracked by 6 users: [display]

ESORICS 2024 : European Symposium on Research in Computer Security


Conference Series : European Symposium on Research in Computer Security
When Sep 16, 2024 - Sep 20, 2024
Where Bydgoszcz, Poland
Submission Deadline Jan 8, 2024
Notification Due Mar 18, 2024
Final Version Due Jun 28, 2024
Categories    computer security   privacy   trust   cybersecurity

Call For Papers

C a l l F o r P a p e r s

29th European Symposium on Research in Computer Security (ESORICS) 2024

16-20 September 2024, Bydgoszcz, Poland


ESORICS is the annual European research event in Computer Security.

The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

We are looking for papers with high quality, original and unpublished
research contributions. The Symposium will start on September 16, 2024
with an exciting technical program, including vetted papers, invited
talks and collocated workshops.

Important Dates:

This year's symposium will have two review cycles. All submissions
must be received by 11:59 p.m. any where on earth Time on the day of
the corresponding deadline.

Winter cycle
* Title and abstract: January 8, 2024 (firm)
* Full paper submission: January 8, 2024 (firm)
* Notification to authors: March 18, 2024
* Camera ready due: June 28, 2024

Spring cycle
* Title and abstract: April 19, 2024 (firm)
* Full paper submission: April 19, 2024 (firm)
* Notification to authors: June 14, 2024
* Camera ready due: June 28, 2024

Paper submissions:

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference / workshop with proceedings. The symposium proceedings will
be published by Springer in the Lecture Notes in Computer Science
series (LNCS). In addition, we will publish a special issue containing
selected papers from the ESORICS 2024 proceedings. As in previous years,
ESORICS will present a Best Paper Award chosen by the Program Committee.
This award is generously sponsored by Springer.

How to submit your paper:

Submitted papers must follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions must be uploaded
to the following EasyChair website:

Only pdf files will be accepted. Submissions are not anonymous.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must agree
with Springer LNCS copyright and guarantee that their papers will be
presented at the conference.

Topics of Interests:

Submissions are solicited in all areas relating to computer security,
including but not limited to:

* Access Control
* Anonymity and Censorship Resistance
* Artificial Intelligence for Security
* Audit and Accountability
* Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
* Data and Computation Integrity
* Database Security
* Digital Content Protection
* Digital Forensics
* Formal Methods for Security and Privacy
* Hardware Security
* Information Hiding
* Identity Management
* Information Flow Control
* Information Security
* Intrusion Detection
* Governance and Management
* Language-based Security
* Malware and Unwanted Software
* Network Security
* Phishing and Spam Prevention
* Privacy Technologies and Mechanisms
* Risk Analysis and Management
* Secure Electronic Voting
* Security Economics and Metrics
* Security and Privacy in Cloud / Fog Systems
* Security and Privacy of Systems based on Machine Learning and A.I.
* Security and Privacy in Crowdsourcing
* Security and Privacy in the IoT and Cyber-Physical Systems
* Security and Privacy in Location-based Services
* Security and Privacy for Mobile / Smartphone Platforms
* Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
* Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
* Security and Privacy in Social Networks
* Security and Privacy in Wireless and Cellular Communications
* Software Security
* Systems Security
* Trustworthy Computing to Secure Networks and Systems
* Usable Security and Privacy
* Web Security

Conflict of Interest (CoI):

The program co-chairs require cooperation from both authors and PC
members to prevent submissions from being evaluated by reviewers who
have a conflict of interest. In the one hand, during the bidding
procedure, PC members will be required to indicate potential CoIs. On
the other hand, authors will be asked during the submission process to
indicate any PC members with whom they share CoIs as well as the types
of CoIs. That is, if they and one the authors 1) share an
institutional affiliation at the time of submission; 2) had at any
time in the past a supervisor/PhD student relationship; 3) have
collaborated or published with in the prior two years; 4) are in some
form of financial relationship, or have been at some point during the
past two years; or 5) are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and
explain the perceived conflict.

Program committee members who have conflicts of interest with a paper,
including program co-chairs, will be excluded from discussing and
reviewing the submission. Authors also need to notify the PC Chairs of
any other reason or circumstance that creates a risk that professional
judgement may be unduly influenced.

The chairs reserve the right to request further explanation and can
remove non-mandatory conflicts at their discretion.

Organizing Team

Michal Choras, Bydgoszcz University of Science and Technology
Sokratis Katsikas, Norwegian University of Science and Technology

Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
Rafal Kozik, Bydgoszcz University of Science and Technology

Paria Shirani, University of Ottawa
Wenjuan Li, Hong Kong Polytechnic University

Tomasz Marciniak, Bydgoszcz University of Science and Technology

Marek Pawlicki, Bydgoszcz University of Science and Technology

Michal Grzybowski, Fundacja Pischingera

Aleksandra Pawlicka, University of Warsaw


Full list available at

This call for papers and additional information about the conference
can be found at

Related Resources

CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICAIR 2024   4th International Conference on AI Research (formally the European Conference on the Impact of Artificial Intelligence and Robotics)
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
ACM-Ei/Scopus-SCDMC 2024   2024 International Conference on Soft Computing, Data Mining and Cybersecurity (SCDMC 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
LAJC 2024   Latin-American Journal of Computing