[Apologies if you got multiple copies of this email.]
Call for Paper: The 2019 IEEE Conference on Dependable and Secure Computing
Hangzhou • China | 18-20 November, 2019
Dear Colleagues,
The IEEE Conference on Dependable and Secure Computing (DSC) solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems. The scope of DSC includes, but is not limited to, the following topics.
Main Track: Computer Systems, Networks, and Software/Hardware
- Advanced Persistent Threat (APT)
- Big Data Analysis
- Botnet and Intrusion Detection
- Cryptographic Methods and Toolkits
- Cyber attacks
- Data/Information Reliability
- Database Security and Privacy
- Embedded Systems and IoT Devices
- Experimentation, Measurement, and Assessment
- Mobile and Cloud Computing
- Software vulnerabilities
- Malware analysis
- SDN and NFV
- Security and Privacy for AI
- Hardware security and reliability
- CAD Algorithms and Tools
- Electronic Circuits and Systems
- Fault-Tolerant Architectures and Designs
- Industrial Design Experiences
- Noise-Aware Designs
- Power-Aware Designs
- Soft-Error Analysis and Models
- Stochastic Circuits and Systems
- Temperature-Aware Designs
- Variable-Latency Designs
- Security Circuits, Designs, and Detection

Experience and Practice Track
The DSC conference will also include a submission category for experience and practice papers on new findings in the aforementioned topics. The PC will evaluate a submission to the experience and practice track with the understanding that it predominantly contributes to design knowhow or the extension of the community’s knowledge about how the security protection of known techniques fares in real-world operations. Authors have to submit a 2-page paper along with a supplemental 3-min video to demonstrate the implementation and/or the practicability of the work. Topics of interest include, but are not limited to:
- Attacks on Information Systems and/or Digital Information Storage
- CSIRTs, Incident Analysis, and Response
- Honeypots/Honeynets
- Malware Analysis and Reversing
- Mobile Communications Security and Vulnerabilities
- Newly discovered vulnerabilities in software and hardware
- Offensive (and Counter-Offensive) Information Technology
- Reverse Engineering, Forensics, and Anti-Forensics
- Spyware, Phishing and Distributed Attacks
- VLSI/CAD Design Knowhow
- Data Security and Privacy

***** Submission Instructions *****
Papers should be no more than 8 pages for regular papers and 2 pages for experience and practice papers. Papers must be written in English conforming to the IEEE standard conference format (US letter, two-column). All submitted papers will be peer-reviewed. Accepted papers will appear in the conference proceedings and will be eligible for submission to the IEEE Xplore Digital Library.
Paper templates can be downloaded from IEEE website - https://www.ieee.org/conferences/publishing/templates.html
Electronic submission site: https://easychair.org/conferences/?conf=dsc2019
***** Important Dates *****
Abstract submission due: 23 June, 2019 (Main conference)
Paper submission due: 30 June, 2019 (Main conference)
Paper acceptance notification: 1 September, 2019
Workshop/poster submission due: 10 August, 2019
Workshop/poster acceptance notification: 5 September, 2019
Camera ready: 20 September, 2019
The dates are in AoE timezone.
***** Contacts *****
We are happy to provide any help and information. Please feel free to contact us. Our unified contant window is [log in to unmask].
===== General Chairs =====
Kui Ren, Zhejiang University, China
Yuejin Du, Alibaba Group, China
===== Program Chairs =====
(Main Track)
Moti Yung, Google and Columbia University, USA
Long Lu, Northeastern University, USA
Cong Wang, City University of Hong Kong, HK
(Experience and Practice Track)
Xiaoning Li, Alibaba Group, China
Xingliang Yuan, Monash University, Australia

You can unsubscribe for this list at any time through this link: