The 14th International Conference on Availability, Reliability and Security
(ARES 2019)
August 26 - August 29, 2019, Canterbury, UK


CD-MAKE 2019 ( will be co-located with ARES!


The 14th International Conference on Availability, Reliability and
Security ("ARES - The International Dependability Conference") will
bring together researchers and practitioners in the area of
dependability. ARES will highlight the various aspects of
dependability - with special focus on the crucial linkage between
availability, reliability and security.

ARES aims at a full and detailed discussion of the research issues of
dependability as an integrative concept that covers amongst others
availability, safety, confidentiality, integrity, maintainability and
security in the different fields of applications.

ARES will emphasize the interplay between foundations and practical
issues of dependability in emerging areas such as e-government,
m-government, location-based applications, ubiquitous computing,
autonomous computing, chances of grid computing etc. ARES is devoted
to the critical examination and research challenges of the various
aspects of Dependable Computing and the definition of a future road

Selected papers that are accepted by and presented at the ARES
Conference will be published, after further revision, in special
issues of international journals (e.g. Springer EURASIP Journal on
Information Security). The acceptance rate of the ARES 2018 conference
was 22,3% (full papers only). ARES 2018 was published by the
International Conference Proceedings Series published by ACM (ACM
ICPS).  ARES is ranked as B-conference in CORE.

Qualis (backed by Brazilian Ministry) ranked ARES and ESORICS as
leading security conference in Europe (A2)

General Chair 2019
Shujun Li, University of Kent

Program Committee Chair 2019
Steven Furnell, University of Plymouth

Submission Deadline: March 15, 2019
Author Notification: May 24, 2019
Proceedings Version: June 23, 2019
Conference: August 26 - August 29, 2019


ARES 2019 will be published by the International Conference
Proceedings Series published by ACM (ACM ICPS).

Authors are invited to submit research and application papers
according the following guidelines: two columns, single-spaced,
including figures and references, using 10 pt fonts and number each

For the main conference as well as the workshops submission papers are
classified into 3 categorizes representing original, previously
unpublished work:
-full paper (10 pages)
-short paper (6 pages)
-workshop paper (8 pages, a maximum of 10 pages is tolerated)

The ARES submission system (EasyChair) is available here:

More information can be found here:

TOPCIS of interest include, but are not limited to:
Authorization, Authentication, and Access Control
Availability, Dependability, and Resilience
Botnets and Botnet Monitoring
Business Continuity & Resilience
Cost/Benefit Analysis
Dependability Aspects for Special Applications
Dependability Aspects of e-Government
Dependability and Resilience in Open Source Software
Designing Security Requirements
Digital Forensics
E-Commerce Dependability
Identity Management
IPR of Security Technology
Incident Response and Prevention
Information Flow Control
Information Hiding and Steganograhpy
Interoperability Aspects
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Mobile Security
Network and Organizational Vulnerability Analysis
Network Security
Privacy-Enhancing Technologies
Process based Security Models and Methods
Resilience and Security for Critical Infrastructures
Resilience of Computing Systems
Resilience, Security, and Privacy for Smart Grids
Resilience, Security, and Privacy for the Internet of Things
RFID Security and Privacy
Risk planning, Analysis & Awareness
Safety Critical Systems
Secure Enterprise Architectures
Security and Privacy for Ubiquitous Systems
Security and Privacy in E-Health
Security and Trust Management in P2P and Grid applications
Security and Privacy for Sensor Networks, Wireless/Mobile Devices and 
Security and Usability
Security as Quality of Service
Security in Distributed Systems / Distributed Databases
Security in Electronic Payments
Security in Electronic Voting
Software Engineering of Dependable Systems
Software Security
Threats and Attack Modelling
Trusted Computing
Tools for Dependable System Design and Evaluation
Trust Models and Trust Management
Wireless Security