Información de la conferencia
DSC 2022: IEEE Conference on Dependable and Secure Computing
https://attend.ieee.org/dsc-2022/Día de Entrega: |
2022-01-31 Extended |
Fecha de Notificación: |
2022-03-31 |
Fecha de Conferencia: |
2022-06-22 |
Ubicación: |
Edinburgh, UK |
Vistas: 14157 Seguidores: 4 Asistentes: 0
Solicitud de Artículos
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics. Main Track: Computer Systems, Networks, and Software/Hardware Advanced Persistent Threat (APT) Big Data Analysis Botnet and Intrusion Detection Cryptographic Methods and Toolkits Cyber attacks Data/Information Reliability Database Security and Privacy Embedded Systems and IoT Devices Experimentation, Measurement, and Assessment Mobile and Cloud Computing Software vulnerabilities Malware analysis SDN and NFV Security and Privacy for AI Hardware security and reliability CAD Algorithms and Tools Electronic Circuits and Systems Fault-Tolerant Architectures and Designs Industrial Design Experiences Noise-Aware Designs Power-Aware Designs Soft-Error Analysis and Models Stochastic Circuits and Systems Temperature-Aware Designs Variable-Latency Designs Security Circuits, Designs, and Detection Experience and Practice Track The DSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design know-how or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental 3-min video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to: Attacks on Information Systems and/or Digital Information Storage CSIRTs, Incident Analysis, and Response Honeypots/Honeynets Malware Analysis and Reversing Mobile Communications Security and Vulnerabilities Newly discovered vulnerabilities in software and hardware Offensive (and Counter-Offensive) Information Technology Reverse Engineering, Forensics, and Anti-Forensics Spyware, Phishing and Distributed Attacks VLSI/CAD Design Knowhow Data Security and Privacy
Última Actualización Por Dou Sun en 2022-01-27
Conferencias Relacionadas
Abreviación | Nombre Completo | Entrega | Conferencia |
---|---|---|---|
MMEDIA | International Conferences on Advances in Multimedia | 2022-01-24 | 2022-04-24 |
CooIDC | USENIX Workshop on Cool Topics in Sustainable Data Centers | 2015-12-22 | 2016-03-19 |
CAPCOM | Context Awareness, Pervasive COmputing, and Mobility | 2013-08-07 | 2013-11-25 |
MIX-AI | MIX Summit and Conference on Artificial Intelligence and Machine Learning | 2018-03-16 | 2018-07-24 |
HCI-Europe | International Conferences in Central Europe on Human Computer Interfaces | 2015-06-20 | 2015-09-14 |
SPDA | International Conference on Smart Phone, Device and Applications | 2014-06-10 | 2014-08-14 |
WOOT | USENIX Workshop on Offensive Technologies | 2020-05-27 | 2020-08-10 |
SAMT | International Conference on Semantic and Digital Media Technologies | 2010-12-01 | |
FSME | International Conference on Future Software Engineering and Multimedia Engineering | 2011-07-10 | 2011-08-13 |
FDL | Forum on specification & Design Languages | 2015-05-18 | 2015-09-14 |
Revistas Relacionadas
CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
---|---|---|---|---|
APL Photonics | 5.400 | American Institute of Physics | 2378-0967 | |
a | IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE | 1545-5971 |
Entropy | 2.100 | MDPI | 1099-4300 | |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO | 2456-6055 | |
Journal of Computer and Systems Sciences International | 0.500 | Springer | 1064-2307 | |
IEEE Transactions on Power Delivery | 3.800 | IEEE | 0885-8977 | |
Journal of Classification | 1.800 | Springer | 0176-4268 | |
Ethics and Information Technology | 3.400 | Springer | 1388-1957 | |
b | ACM Transactions on Embedded Computing Systems | 2.800 | ACM | 1539-9087 |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical | 1895-7595 |
Nombre Completo | Factor de Impacto | Editor |
---|---|---|
APL Photonics | 5.400 | American Institute of Physics |
IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE |
Entropy | 2.100 | MDPI |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO |
Journal of Computer and Systems Sciences International | 0.500 | Springer |
IEEE Transactions on Power Delivery | 3.800 | IEEE |
Journal of Classification | 1.800 | Springer |
Ethics and Information Technology | 3.400 | Springer |
ACM Transactions on Embedded Computing Systems | 2.800 | ACM |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical |
Recomendaciones