(mobo import Concept___Events-migrated) |
(mobo import Concept___Events_With_Metrics-migrated) |
||
Line 9: | Line 9: | ||
|has program chair=Christian Doerr, Sebastian Schrittwieser | |has program chair=Christian Doerr, Sebastian Schrittwieser | ||
|has workshop chair=Edgar Weippl | |has workshop chair=Edgar Weippl | ||
− | |||
− | |||
− | |||
|has Proceedings Link=https://dl.acm.org/doi/proceedings/10.1145/3230833#issue-downloads | |has Proceedings Link=https://dl.acm.org/doi/proceedings/10.1145/3230833#issue-downloads | ||
|has Proceedings DOI=https://doi.org/10.1145/3230833 | |has Proceedings DOI=https://doi.org/10.1145/3230833 | ||
Line 29: | Line 26: | ||
|Camera-Ready Deadline=2018/06/29 | |Camera-Ready Deadline=2018/06/29 | ||
|Submission Deadline=2018/03/16 | |Submission Deadline=2018/03/16 | ||
+ | }} | ||
+ | {{Event Metric | ||
+ | |Number Of Submitted Papers=112 | ||
+ | |Number Of Accepted Papers=25 | ||
+ | |Number Of Accepted Short Papers=12 | ||
}} | }} | ||
{{S Event}} | {{S Event}} |
Revision as of 13:29, 18 October 2022
Deadlines
|
||
Submission |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Submitted Papers
112
Accepted Papers
25
Accepted Short Papers
12
Venue
Universität Hamburg, Hamburg, Germany
The 13th International Conference on Availability, Reliability and Security (ARES) 2018
Topics
- Authorization, Authentication, and Access Control
- Availability, Dependability, and Resilience
- Botnets and Botnet Monitoring
- Business Continuity & Resilience
- Cost/Benefit Analysis
- Cryptography
- Dependability Aspects for Special Applications
- Dependability Aspects of e-Government
- Dependability and Resilience in Open Source Software
- Designing Security Requirements
- Digital Forensics
- E-Commerce Dependability
- Identity Management
- IPR of Security Technology
- Incident Response and Prevention
- Information Flow Control
- Information Hiding and Steganography
- Interoperability Aspects
- Intrusion Detection and Fraud Detection
- Legal Issues related to Security and Privacy
- Mobile Security
- Network and Organizational Vulnerability Analysis
- Network Security
- Privacy-Enhancing Technologies
- Process based Security Models and Methods
- Resilience and Security for Critical Infrastructures
- Resilience of Computing Systems
- Resilience, Security, and Privacy for Smart Grids
- Resilience, Security, and Privacy for the Internet of Things
- RFID Security and Privacy
- Risk planning, Analysis & Awareness
- Safety Critical Systems
- Secure Enterprise Architectures
- Security and Privacy for Ubiquitous Systems
- Security and Privacy in E-Health
- Security and Trust Management in P2P and Grid applications
- Security and Privacy for Sensor Networks, Wireless/Mobile Devices and Applications
- Security and Usability
- Security as Quality of Service
- Security in Distributed Systems / Distributed Databases
- Security in Electronic Payments
- Security in Electronic Voting
- Software Engineering of Dependable Systems
- Software Security
- Threats and Attack Modelling
- Trusted Computing
- Tools for Dependable System Design and Evaluation
- Trust Models and Trust Management
- Wireless Security
Important Dates
Submission Deadline: March 16, 2018 extended to March 30, 2018 (23:59 UTC-11)
Author Notification: May 30, 2018
Camera-ready: June 29, 2018
Conference: August 27 – August 30, 2018