ARES 2022 The 17th International Conference on
 Availability, Reliability and Security, 
Vienna, Austria, 
August 23 - August 26, 2022. 
(Submissions due March 06, 2022)

The 17th International Conference on Availability, Reliability and
Security ("ARES - The International Dependability Conference") will
bring together researchers and practitioners in the area of
dependability. ARES will highlight the various aspects of
dependability - with special focus on the crucial linkage between
availability, reliability, and security.

ARES aims at a full and detailed discussion of the research issues of
dependability as an integrative concept that covers amongst others
availability, safety, confidentiality, integrity, maintainability, and
security in the different fields of applications. ARES will emphasize
the interplay between foundations and practical issues of
dependability in emerging areas such as e-government, m-government,
location-based applications, ubiquitous computing, autonomous
computing, chances of grid computing etc. ARES is devoted to the
critical examination and research challenges of the various aspects of
Dependable Computing and the definition of a future road map.

Topics of interest include, but are not limited to:
Authorization, Authentication, and Access Control
Availability, Confidentiality, Integrity
Botnets and Botnet Monitoring
Dependability, and Resilience
Designing Security Requirements
Digital Forensics
Human Factors in Security and Privacy
Identity Management
Incident Response and Prevention
Information Hiding and Steganography
Intrusion Detection and Fraud Detection
Legal Issues related to Security and Privacy
Machine Learning for Security and Privacy
Security and Privacy for Machine Learning
Mobile Security
Network Security
Privacy-Enhancing Technologies (PETs)
Process based Security Models and Methods
Risk Analysis
Side Channels
Software Security
Security and Privacy for:
-Ubiquitous and Distributed Systems, e.g., Sensor Networks, Vehicular
 Networks, RFIDs
-Distributed Databases,
-Critical Infrastructures, e.g., Smart Grids
Security and Privacy Awareness
Usable Security and Privacy
Threats and Attack Modelling
Trusted Computing
Trust Models and Trust Management
Wireless Security
Web Security and Privacy

For more information, please see