
-------- Weitergeleitete Nachricht -------- Betreff: [Call for Papers] IEEE DSC 2025 - Submission Deadline in 2 Weeks! Datum: Tue, 13 May 2025 23:09:07 +0000 Von: Hu, Yiwen huyiwen3@msu.edu An: tciin@comsoc.org tciin@comsoc.org
ICCRI Logo
IEEE DSC 2025
*The IEEE Conference on Dependable and Secure Computing (DSC 2025) https://urldefense.com/v3/__https://attend.ieee.org/dsc-2025/__;!!HXCxUKc!3sDrjPdcPpgIThB-E_k4ukXos8yl4iChTPrVvABJzZdSguFujkCb5lDCYhPQiE36uCliReoGOvNLwEbhT847jQ$*invites submissions of papers, posters, and practices/experiences showcasing innovative research, practical solutions, and emerging challenges in dependable and secure computing. This premier conference aims to bring together researchers, practitioners, and industry leaders to advance the state-of-the-art in designing, implementing, and analyzing dependable and secure computing systems. We welcome contributions covering the entire IT landscape, including hardware design, software engineering, network security, cloud computing, IoT security, and AI-driven security solutions, with a strong focus on dependability and security.
Publication
Accepted papers will be eligible for submission to the IEEE Xplore Digital Library. At least one author of each accepted paper must register for the paper at the conference.
The IEEE DSC conference accepts regular and short research papers on topics that include, but are not limited to:
Main Track: Regular Papers
* Advanced Persistent Threat (APT) * Big Data Analysis * Botnet and Intrusion Detection * Cryptographic Methods and Toolkits * Cyber attacks * Data/Information Reliability * Database Security and Privacy * Embedded Systems and IoT Devices * Experimentation, Measurement, and Assessment * Mobile and Cloud Computing * Software vulnerabilities * SDN and NFV * Hardware security and reliability * CAD Algorithms and Tools
Experience and Practice Track: Short Papers
* Attacks on Information Systems and/or Digital Information Storage * CSIRTs, Incident Analysis, and Response * Honeypots/Honeynets * Malware Analysis and Reversing * Mobile Communications Security and Vulnerabilities * Newly discovered vulnerabilities in software and hardware * Offensive (and Counter-Offensive) Information Technology
Important Dates
*Paper Submission:* May 24, 2025 *Author Notification:* July 15, 2025 *Camera-Ready Submission:* August 22, 2025 *Conference Dates:* October 18-20, 2025 *Submit Paper https://urldefense.com/v3/__https://edas.info/N33678__;!!HXCxUKc!3sDrjPdcPpgIThB-E_k4ukXos8yl4iChTPrVvABJzZdSguFujkCb5lDCYhPQiE36uCliReoGOvNLwEb2bveFYw$*
For an extensive overview of topics and comprehensive submission guidelines, please visit the conference website.
GENERAL CO-CHAIRS
Chi-Yu Li, National Yang Ming Chiao Tung University
Chunyi Peng, Purdue University
PROGRAM CO-CHAIRS (Main Track)
Guan-Hua Tu, Michigan State University
Rhongho Jang, Wayne State University
PROGRAM CHAIR (Experience and Practice Track)
Tian Xie, Utah State University
[Please accept our apologies if you receive multiple copies of this email]
---------------------------------------------------------------------------
To unsubscribe from the tciin list, click the following link: https://comsoc-listserv.ieee.org/cgi-bin/wa?SUBED1=tciin&A=1