Call for Submissions - Topics

We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:

  • Access Control
  • Advanced Persistent Threats
  • Adversarial Machine Learning
  • Anonymity and Anonymization
  • Applied Cryptography
  • Assurance
  • Attacking Machine Learning
  • Attribution And Non-Attribution
  • Audit
  • Automated Decision Making and Response
  • Autonomous Vehicle/System Security
  • Big Data for Security (Hard Topic Theme!)
  • Biometrics
  • Security case studies
  • Cloud Security
  • Cyber Threat Intelligence
  • Cyber-Physical Systems
  • Deception
  • Denial of Service
  • Digital Forensics
  • Distributed Systems Security
  • Embedded Systems Security
  • Enterprise Security Management
  • Event Correlation
  • Digital Forensics
  • Identity Management
  • Incident Response
  • Insider Threat and Protection
  • Integrity
  • Intrusion Detection
  • Intellectual Property
  • Large-Scale Data Processing And Analysis
  • Machine Learning For Security
  • Malware
  • Mobile/Wireless Security
  • Moving Target Defense
  • Multimedia Security
  • Network Security
  • OS Security
  • Privacy & Data Protection
  • Privilege Management
  • Red Teaming Techniques
  • Resilience
  • Reverse Engineering
  • Security Architectures
  • Security and Privacy of the Internet of Things
  • Security Engineering
  • Security Policies
  • Sensors
  • Software Security
  • Software-Defined Programmable Security (e.g., SDN, NFV)
  • Supply Chain Security
  • Threat Hunting
  • Trust Management
  • Trustworthy Computing
  • Usability and Human-centric Aspects of Security
  • Virtualization Security
  • Web Security

Additional ACSA Events:
NSPW – New Security Paradigms Workshop
LASER – Learning from Authoritative Security Experiment Results