The 17th International Conference on Availability, Reliability and Security (ARES 2022)
August 23 – August 26, 2022
Call for Papers
The 17th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners.
…will highlight the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security.
…aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
…will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, location-based applications, ubiquitous computing, autonomous computing, changes of grid computing etc.
…is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.
The acceptance rate of the ARES 2021 conference was 20,34% (full papers only). ARES 2021 was published by the International Conference Proceedings Series published by ACM (ACM ICPS).
ARES is ranked as B-conference in CORE.
General Chair 2022
Edgar Weippl, SBA Research & University of Vienna, Austria
Program Committee Chairs 2022
Dominik Engel, Salzburg University of Applied Sciences, Austria
Mathias Fischer, University of Hamburg, Germany
Workshop Chair 2022
Maria Leitner, University of Vienna / AIT Austrian Insitute of Technology, Austria
EU Symposium Workshop Chair 2022
Florian Skopik, AIT, Austrian Institute of Technology, Austria
|Extended Submission Deadline|
|Author Notification||May 16, 2022|
|Conference||August 23 – August 26, 2022|
* all papers need to be submitted in EasyChair until this date. No additional updates possible after March 23, 2022 (AoE).
TOPICS OF INTEREST
Include, but are not limited to
Authorization, Authentication, and Access Control
Availability, Confidentiality, Integrity
Botnets and Botnet Monitoring
Dependability, and Resilience
Designing Security Requirements
Human Factors in Security and Privacy
Incident Response and Prevention
Information Hiding and Steganography
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Machine Learning for Security and Privacy
Security and Privacy for Machine Learning
Privacy-Enhancing Technologies (PETs)
Process based Security Models and Methods
Security and Privacy for:
Ubiquitous and Distributed Systems, e.g., Sensor Networks, Vehicular Networks, RFIDs
Critical Infrastructures, e.g., Smart Grids
Security and Privacy Awareness
Usable Security and Privacy
Threats and Attack Modelling
Trust Models and Trust Management
Web Security and Privacy