AISC Proceeding will be published in ACM Library
Authors are invited to submit original research papers on provable and practical security. The Program Committee will select papers based on their novelty, technical depth, clarity of presentation, and potential to advance both theoretical understanding and practical learning outcomes in cybersecurity. Research papers must be between 5 and 10 pages in length (inclusive of references). Industry papers must be between 4 and 6 pages in length (inclusive of references)
Areas of Interest
Topics of interest include, but are not limited to:
System security: Distributed systems security, Cloud computing security
Network security: Intrusion and anomaly detection and prevention, Network infrastructure security, Analysis of network and security protocols
Blockchain and distributed ledger security
Software Security: Malware analysis, Automated security analysis of source code and binaries, Program analysis, Fuzzing and vulnerability discovery
Web Security
ML Security
Cyber-physical systems security
Applications of cryptography: Analysis of deployed cryptography and cryptographic protocols, Secure cryptographic protocols and applications, Leakage-resilient cryptography, Lattice-based and post-quantum cryptography
Authentication, access control, and authorization
Privacy and Anonymity: Anonymity, Privacy-preserving computation, Privacy attacks, Privacy-enhancing technologies
Instructions for Authors
Submissions should be made via EasyChair. Note: When starting a submission, you will need to begin by selecting a track. Be sure to select the correct track AISC2026. Please follow the steps below
Submissions should be in two-column format (i.e., use "sigconf" style in the document class for Latex) and should use the ACM SIG Proceedings template (available in Latex and Word). Submissions should be made to EasyChair in PDF format:
Further author guidelines are available here: https://www.acm.org/publications/proceedings-template
All the submissions must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Submissions must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions must be written in English.
Research papers should present original contributions that advance knowledge in one or more of the listed areas of interest. Submissions may focus on:
Design and development of new methods, models, or architectures to address emerging threats in systems, networks, cloud, blockchain, software, or web security.
Analyses of security protocols, tools, or infrastructures, including studies of their effectiveness, scalability, or resilience.
Detection and prevention techniques for intrusion, malware, and anomalies, particularly those using data-driven or machine learning approaches.
Advances in cryptography and privacy, including post-quantum schemes, secure protocols, and privacy-preserving technologies.
Case studies and evaluations that provide empirical evidence or benchmarks for the community.
Papers should clearly describe the problem being addressed, the approach taken, and the results or insights obtained. Both theoretical developments and practically motivated studies are welcome, provided they demonstrate relevance to the broader cybersecurity community.
Research papers will be assessed on originality, significance, technical depth, and clarity of presentation.
In addition to academic research, AISC welcomes industry-focused contributions that bridge the gap between theory and practice. These papers should emphasize real-world applications, lessons learned, and practical impact, such as:
Case studies of large-scale security deployments in industry or government.
Description and evaluation of new security tools or platforms.
Analyses of emerging threats, attack trends, or incident response in operational settings.
Reports on standards, best practices, or compliance frameworks and their adoption challenges.
Demonstrations of academic–industry collaboration that highlight practical relevance of research.
We particularly encourage submissions that present novel ways of demonstrating or applying security concepts in industry contexts.
Industry papers will be evaluated on practical significance, clarity of insights, and potential to influence practice.
REVIEW PROCESS
All research and industry papers will undergo double-blind peer review by at least three members of the Program Committee.
PUBLICATION COST
As the proceedings will be published in the ACM Digital Library, all authors need to be aware of the new cost structure for ICPS conferences (which include AISC). The basic cost of publication used to be borne by the conference, with authors able to pay extra to have a paper made open access, but now the full cost has reverted to the authors – unless they work in an institution that is a member of the ACM Open program or in a country classified as low-income. Note that this fee is to be paid only once for each paper, not each author. (Most Australian and New Zealand universities are members of the ACM open program, but prospective authors should check with their university.)
Please look carefully at the guidance (https://www.acm.org/publications/icps/author-guidance) to determine whether you will be required to pay the publishing cost, and if so, how much. Please note that any cost must be paid 45 days before the start of the conference and that there are serious consequences for non-payment. We can confirm that most Australian universities are members of ACM Open, but we have not checked the situation for each submission.
Important note to authors about ACM's new open access publishing model
ACM has introduced a new open access publishing model for the International Conference Proceedings Series (ICPS). Authors based at institutions that are not yet part of the ACM Open program and do not qualify for a full geographic waiver will be required to pay an article processing charge (APC) to publish their ICPS article in the ACM Digital Library. To determine whether or not an APC will be applicable to your article, please follow the detailed guidance here: https://www.acm.org/publications/icps/author-guidance.
Further information may be found on the ACM website, as follows:
Full details of the new ICPS publishing model: https://www.acm.org/publications/icps/faq
Full details of the ACM Open program: https://www.acm.org/publications/openaccess
Please direct all questions about the new model to icps-info@acm.org.