Conference Information
CSET 2024: Workshop on Cyber Security Experimentation and Test
https://cset24.isi.edu/Submission Date: |
2025-09-17 Extended |
Notification Date: |
2025-10-15 |
Conference Date: |
2024-08-13 |
Location: |
Philadelphia, Pennsylvania, USA |
Years: |
17 |
Viewed: 20018 Tracked: 3 Attend: 0
Call For Papers
Overview For 17 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for discussing all encompassing cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and demonstrably grow community resources. Invited Topics For CSET '25, we solicit exciting work across a broad range of areas relevant to security and privacy. A list of topics of interest (broadly interpreted): * Cybersecurity research methods: designing and conducting large and complex system evaluations in the context of cybersecurity, i.e., experiences and discussions of qualitative and quantitative methods, what are the models and tools that facilitate research. * Measurement and metrics: measurement required to understand performance and optimization of cybersecurity systems and defining appropriate metrics, i.e., valid metrics, test cases, and benchmarks, effectiveness of metric in evaluation, impact of measurement on evaluation. * Data sets: collection, analysis, and interpretation of data for cyber security, i.e., what makes good data sets and how do we compare data sets, methods to collect, generate, or derive new ones, historical impact of a dataset. * Experimental infrastructure: testbeds, simulations, emulations, and virtualizations, i.e., designing, orchestrating, and deploying testbeds, tools for improving testbed operation and maintenance, usage and impact studies of experimentation infrastructure. * Education: surveys, tools, and techniques for cyber security education and training, i.e., evaluating and presenting educational approaches to cybersecurity, approaches that leverage datasets, utilize testbeds, apply experiential learning principles, or promote awareness of research methods and sound measurement approaches. * High consequence cyber systems: rigorous experimental methodologies, i.e., appropriate design of experiments, parameter sampling strategies, quantifying uncertainties with confidence intervals, ensuring reproducibility, and validating models. * Ethics in cybersecurity: tussle between security and privacy, i.e., experiences balancing stakeholder considerations, participant privacy, frameworks for evaluating the ethics of cybersecurity experiments, and illustrative experiment samples for ethical conduct that upholds the code outlined in http://cpsr.org/issues/ethics/cei/. * Evaluating real-world security controls: measurements of deployed security frameworks, i.e., evaluation methodologies for real-world security performance, user-related characteristics (behavior, demographics) modeling, cybersecurity and social media.
Last updated by Victor Le Pochat in 2025-09-04
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| CSF | IEEE Computer Security Foundations Symposium | 2026-07-26 |
| ACSAC | Annual Computer Security Applications Conference | 2025-12-09 |
| NSPW | New Security Paradigms Workshop | 2025-08-24 |
| SecureComm | International ICST Conference on Security and Privacy in Communication Networks | 2025-07-04 |
| SIN | International Conference on Security of Information and Networks | 2024-12-02 |
| ASID | International Conference on Anti-counterfeiting, Security, and Identification | 2024-11-01 |
| ISPEC | International Conference on Information Security Practice and Experience | 2024-10-25 |
| ICCTA | International Conference on Computer Theory and Applications | 2023-12-16 |
| SECURWARE | International Conference on Emerging Security Information, Systems and Technologies | 2022-10-16 |
| SEC | International Conference on ICT Systems Security and Privacy Protection | 2022-06-13 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Computers & Operations Research | 4.3 | Elsevier | 0305-0548 | |
| Enterprise Information Systems | 3.9 | Taylor & Francis | 1751-7575 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| International Journal of Circuit Theory and Applications | 1.800 | Wiley-Blackwell | 0098-9886 | |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| Journal of Computer and Systems Sciences International | 0.500 | Springer | 1064-2307 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Computers & Operations Research | 4.3 | Elsevier |
| Enterprise Information Systems | 3.9 | Taylor & Francis |
| Journal of Information Security and Applications | 3.7 | Elsevier |
| Computer Law & Security Review | 3.2 | Elsevier |
| Computer Law and Security Review | 3.2 | Elsevier |
| Journal of Cybersecurity | 3.2 | Oxford University Press |
| IEEE Security & Privacy | 3.0 | IEEE |
| International Journal of Circuit Theory and Applications | 1.800 | Wiley-Blackwell |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd |
| Journal of Computer and Systems Sciences International | 0.500 | Springer |