Solicited papers
C&ESAR invites submissions on a broad range of cybersecurity topics, covering:
- All phases of the system lifecycle – from requirements elicitation to decommissioning, including legal and regulatory aspects, DevSecOps, operational cyber defense, penetration testing, and disinformation.
- All types of technologies and environments – including socio-economic systems, networks, embedded systems, industrial control systems, IoT, personal devices, cloud, and edge computing.
C&ESAR solicits submissions in the following categories:
- Scholarly papers:
- Regular papers (10-16 pages) and short papers (5-9 pages): Original, unpublished research conducted by the authors.
- Systematization of Knowledge (SoK) papers (10-16 pages): “Evaluate, systematize, and contextualize existing knowledge” (SoK papers description available at https://www.jsys.org/type_SoK/; examples available at https://oaklandsok.github.io/);
- Extended abstracts (2-16 pages): Summarize previously published peer-reviewed journal or conference papers (by the same authors). Topics of special interest include reports on the state of the art or practice, surveys, experience reports, and directly applicable solutions to common problems.
- Professional/Trade papers:
- Replication papers (5-16 pages): Replicate, question and clarify existing published research.
- Practice papers (2-16 pages): Didactic practical insights into cybersecurity of special interest for C&ESAR’s audience, including engineering, legal, social, or geopolitical aspects.
In addition, C&ESAR distinguishes between papers describing mature work and Work in Progress (WiP). C&ESAR accepts both types of papers. WiP papers should introduce promising concepts even if they are incomplete or preliminary. Evaluations will prioritize novelty and relevance over completeness and correctness.