
October 11 - October 11, 2026
The International Symposium on Research in Attacks, Intrusions and Defenses
No followers yet.
Overview
We invite submissions describing original research on all well-motivated computer security problems. Topics of interest include techniques for identifying new real-world threats, as well as methods to prevent, detect, mitigate, or assess the prevalence and impact of such threats. We particularly encourage measurement studies, papers that provide public access to new tools or datasets, and experience papers that clearly articulate important lessons learned. RAID solicits submissions on all aspects of computer security, including but not limited to: Cloud Security, Cyber Crime and Underground Economies, Cyber-Physical Systems Security and Threats Against Critical Infrastructure, Digital Forensics, Intrusion Detection and Prevention, IoT Security, Machine Learning for Security, Malware and Unwanted Software, Mobile Security and Privacy, Network Security, Program Analysis and Reverse Engineering, Security Education and Training, Security Measurement Studies, Security of Machine Learning, Security of Machine Learning Systems, Software Security, Systems Security, Statistical and Adversarial Learning for Computer Security, Usable Security and Privacy, Vulnerability Analysis and Exploitation Techniques, Web Security and Privacy. Papers will be judged on novelty, significance, technical correctness, clarity, and ethics. We expect submissions to include enough detail to support the reproducibility of experimental results, and we strongly encourage authors to make tools and datasets publicly available whenever possible. Submissions must be a PDF file Springer format LNCS template 20 pages (excluding references). Double-blind peer review. At least three reviewers per paper. Papers must be properly anonymized. Must be original work, not duplicate submissions.
Call for papers
We invite submissions describing original research on all well-motivated computer security problems. Topics of interest include techniques for identifying new real-world threats, as well as methods to prevent, detect, mitigate, or assess the prevalence and impact of such threats. We particularly encourage measurement studies, papers that provide public access to new tools or datasets, and experience papers that clearly articulate important lessons learned. RAID solicits submissions on all aspects of computer security, including but not limited to: Cloud Security, Cyber Crime and Underground Economies, Cyber-Physical Systems Security and Threats Against Critical Infrastructure, Digital Forensics, Intrusion Detection and Prevention, IoT Security, Machine Learning for Security, Malware and Unwanted Software, Mobile Security and Privacy, Network Security, Program Analysis and Reverse Engineering, Security Education and Training, Security Measurement Studies, Security of Machine Learning, Security of Machine Learning Systems, Software Security, Systems Security, Statistical and Adversarial Learning for Computer Security, Usable Security and Privacy, Vulnerability Analysis and Exploitation Techniques, Web Security and Privacy. Papers will be judged on novelty, significance, technical correctness, clarity, and ethics. We expect submissions to include enough detail to support the reproducibility of experimental results, and we strongly encourage authors to make tools and datasets publicly available whenever possible. Submissions must be a PDF file Springer format LNCS template 20 pages (excluding references). Double-blind peer review. At least three reviewers per paper. Papers must be properly anonymized. Must be original work, not duplicate submissions.
Important Dates
Conference Dates
Conference Date
October 11, 2026
- October 19, 2025 - October 22, 2025
Source Rank
Source: CORE2023
Rank: A
Field of Research: Cybersecurity and privacy, No longer used