The Nineteenth International Conference on Emerging Security Information, Systems and Technologies

SECURWARE 2025

October 26, 2025 to October 30, 2025 - Barcelona, Spain

Deadlines

Submission

Jul 25, 2025

Notification

Aug 27, 2025

Registration

Sep 09, 2025

Camera ready

Sep 21, 2025

Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).

Publication

Published by IARIA Press (operated by Xpert Publishing Services)

Archived in the Open Access IARIA ThinkMind Digital Library

Prints available at Curran Associates, Inc.

Authors of selected papers will be invited to submit extended versions to a IARIA Journal

Indexing Procedure

Affiliated Journals

SECURWARE 2025 - The Nineteenth International Conference on Emerging Security Information, Systems and Technologies

October 26, 2025 - October 30, 2025

SECURWARE 2025: Awards
Onsite and Online Options: In order to accommodate various situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).

The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. The authors of these papers are also receiving invitations to submit an extended article version to one of the IARIA Journals.

 

Awarded Papers (also Invited for IARIA Journals)

Optimizing Certificate Validation in OT Environments
Steffen Fries, Rainer Falk, Andreas Guettinger

From ECU to VSOC: UDS Security Monitoring Strategies
Ali Recai Yekta, Nicolas Loza, Jens Gramm, Michael Peter Schneider, Stefan Katzenbeisser

Quantifying Persuasion - A Comparative Analysis of Cialdini's Principles in Phishing Attacks
Alexander Lawall

Supporting the Security Modelling in Operational Technology by identifying capacities of Hidden Channels in ICS protocols
Robert Altschaffel, Sönke Otten, Stefan Kiltz, Jana Dittmann

Identification of Dual Processes Using Power Side-channels
Jakob Sternby, Niklas Lindskog, Håkan Englund

A Modular and Flexible OPC UA Testbed Prototype for Cybersecurity Research
Sebastian Kraust, Peter Heller, Jürgen Mottok

A Comparative Study of Machine Learning and Quantum Models for Spam Email Detection
Cameron Williams, Taieba Tasnim, Berkeley Wu, Mohammad Rahman, Fan Wu

Evaluating User Perceptions of Privacy Protection in Smart Healthcare Services
Huan Gua, Elias Seid, Yuhong Li, Fredrik Blix

Towards Post-Quantum-Ready Automated Certificate Lifecycle Management in Operational Technology
Ayham Alhulaibi, Tobias Frauenschläger, Jürgen Mottok

 

The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals.

Papers Invited for IARIA Journals

Threat-Based Vulnerability Management: Mapping CVEs to the MITRE ATT&CK Framework
Logan McMahon, Oluwafemi Olukoya

Secure Software Brownfield Engineering – Sequence Diagram Identification
Aspen Olmsted

Measurability: Toward Integrating Metrics into Ratings for Scalable Proactive Cybersecurity Management
William Yurcik, Stephen North, Rhonda O'Kane, Sami Saydjari, Fabio Roberto de Miranda, Rodolfo da Silva Avelino, Gregory Pluta

General Conversion Scheme of Card-based Protocols for Two-colored Cards to Updown Cards ― the number of cards for computing an arbitrary function
Takumi Sakurai, Yuichi Kaji

DeepAuthVerify - A Modular Framework for Deepfake Detection in Facial Authentication Systems
Domenico Di Palma, Alexander Lawall, Kristina Schaaff

Comparison of Password-Authenticated Key Exchange Schemes on Android
Jörn-Marc Schmidt, Alexander Lawall

Towards Automated Penetration Testing Using Inverse Soft-Q Learning
Dongfang Song, Yuhong Li, Ala Berzinji, Elias Seid

Hidden-Non-Malicious-Dummies for Evaluation of Defense Mechanisms of Industrial Control System against Steganographic Attacks
Robert Altschaffel, Stefan Kiltz, Jana Dittmann, Tom Neubert, Laura Buxhoidt, Claus Vielhauer, Matthias Lange, Rüdiger Mecke

The Balanced Chance & Cyber‑Risk Card: Extending Reichmann's Multidimensional Controlling Framework for C‑Level Steering in SMEs
Alexander Lawall, Maik Drozdzynski

Artificial Intelligence or Artificial Stupidity? The Inability of Small LLMs to Reason, Even Given the Correct Answer!
Salvatore Vella, Salah Sharieh, Alex Ferworn

Improving Crypto-Agility in Operational Technology through Exchangeable Smart Cards
Tobias Frauenschläger, Jürgen Mottok

A Modified Schnorr Sigma Protocol and Its Application to Isogeny-Based Identification
Mahdi Mahdavi, Zaira Pindado, Amineh Sakhaie, Helena Rifà-Pous

Cloud Security Misconfigurations and Compliance: An Empirical Model for DORA Readiness in Financial Environments
Ali Ferzali, Naol Mengistu, Elias Seid, Fredrik Blix

 

Technical Co-Sponsors and Logistic Supporters