Conference Information
DSC 2025: IEEE Conference on Dependable and Secure Computing
https://attend.ieee.org/dsc-2025/Submission Date: |
2025-05-24 |
Notification Date: |
2025-07-15 |
Conference Date: |
2025-10-18 |
Location: |
Taipei, Taiwan |
Years: |
8 |
Viewed: 15064 Tracked: 4 Attend: 0
Call For Papers
The IEEE Conference on Dependable and Secure Computing (DSC 2025) invites submissions of papers, posters, and practices/experiences showcasing innovative research, practical solutions, and emerging challenges in dependable and secure computing. This premier conference aims to bring together researchers, practitioners, and industry leaders to advance the state-of-the-art in designing, implementing, and analyzing dependable and secure computing systems. We welcome contributions covering the entire IT landscape, including hardware design, software engineering, network security, cloud computing, IoT security, and AI-driven security solutions, with a strong focus on dependability and security. Accepted papers will be eligible for submission to the IEEE Xplore Digital Library . Main Track: Regular Papers The DSC conference accepts regular research papers that have no more than 8 pages. Topics of interest include, but are not limited to: Advanced Persistent Threat (APT) Big Data Analysis Botnet and Intrusion Detection Cryptographic Methods and Toolkits Cyber attacks Data/Information Reliability Database Security and Privacy Embedded Systems and IoT Devices Experimentation, Measurement, and Assessment Mobile and Cloud Computing Software vulnerabilities Malware analysis SDN and NFV Security and Privacy for AI Hardware security and reliability CAD Algorithms and Tools Electronic Circuits and Systems Fault-Tolerant Architectures and Designs Industrial Design Experiences Noise-Aware Designs Power-Aware Designs Soft-Error Analysis and Models Stochastic Circuits and Systems Temperature-Aware Designs Variable-Latency Designs Security Circuits, Designs, and Detection Experience and Practice Track: Short Papers The DSC conference also solicits short (2-page) experience and practice papers that present new findings from operational or experimental systems. Submissions to this track will be evaluated with the understanding that they primarily contribute to practical know-how or an enhanced understanding of how established security techniques perform in real-world deployments. Authors have to submit a 2-page paper along with a supplemental video (up to 3 minutes) demonstrating the implementation and/or the practicability of the work. Topics of interest include, but are not limited to: Attacks on Information Systems and/or Digital Information Storage CSIRTs, Incident Analysis, and Response Honeypots/Honeynets Malware Analysis and Reversing Mobile Communications Security and Vulnerabilities Newly discovered vulnerabilities in software and hardware Offensive (and Counter-Offensive) Information Technology Reverse Engineering, Forensics, and Anti-Forensics Spyware, Phishing and Distributed Attacks VLSI/CAD Design Knowhow Data Security and Privacy PPML and online advertising Attacks on model robustness
Last updated by Dou Sun in 2025-05-01
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
MMEDIA | International Conferences on Advances in Multimedia | 2022-01-24 | 2022-04-24 |
CooIDC | USENIX Workshop on Cool Topics in Sustainable Data Centers | 2015-12-22 | 2016-03-19 |
CAPCOM | Context Awareness, Pervasive COmputing, and Mobility | 2013-08-07 | 2013-11-25 |
MIX-AI | MIX Summit and Conference on Artificial Intelligence and Machine Learning | 2018-03-16 | 2018-07-24 |
HCI-Europe | International Conferences in Central Europe on Human Computer Interfaces | 2015-06-20 | 2015-09-14 |
SPDA | International Conference on Smart Phone, Device and Applications | 2014-06-10 | 2014-08-14 |
WOOT | USENIX Workshop on Offensive Technologies | 2020-05-27 | 2020-08-10 |
SAMT | International Conference on Semantic and Digital Media Technologies | 2010-12-01 | |
FSME | International Conference on Future Software Engineering and Multimedia Engineering | 2011-07-10 | 2011-08-13 |
FDL | Forum on specification & Design Languages | 2015-05-18 | 2015-09-14 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
APL Photonics | 5.400 | American Institute of Physics | 2378-0967 | |
a | IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE | 1545-5971 |
Entropy | 2.100 | MDPI | 1099-4300 | |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO | 2456-6055 | |
Journal of Computer and Systems Sciences International | 0.500 | Springer | 1064-2307 | |
IEEE Transactions on Power Delivery | 3.800 | IEEE | 0885-8977 | |
Journal of Classification | 1.800 | Springer | 0176-4268 | |
Ethics and Information Technology | 3.400 | Springer | 1388-1957 | |
b | ACM Transactions on Embedded Computing Systems | 2.800 | ACM | 1539-9087 |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical | 1895-7595 |
Full Name | Impact Factor | Publisher |
---|---|---|
APL Photonics | 5.400 | American Institute of Physics |
IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE |
Entropy | 2.100 | MDPI |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO |
Journal of Computer and Systems Sciences International | 0.500 | Springer |
IEEE Transactions on Power Delivery | 3.800 | IEEE |
Journal of Classification | 1.800 | Springer |
Ethics and Information Technology | 3.400 | Springer |
ACM Transactions on Embedded Computing Systems | 2.800 | ACM |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical |
Recommendation