We invite submissions describing original research on all well-motivated computer security problems. Topics of interest include techniques for identifying new real-world threats, as well as methods to prevent, detect, mitigate, or assess the prevalence and impact of such threats. We particularly encourage measurement studies, papers that provide public access to new tools or datasets, and experience papers that clearly articulate important lessons learned.
We are looking for volunteers, and we are accepting nominations (self-nominations are welcome as well).
If interested, please fill in this formRAID solicits submissions on all aspects of computer security, including but not limited to:
Papers will be judged on novelty, significance, technical correctness, clarity, and ethics. We expect submissions to include enough detail to support the reproducibility of experimental results, and we strongly encourage authors to make tools and datasets publicly available whenever possible.
More information is available at https://raid2026.org/.
Get LNCS Template Submit Paper
Note: Reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the LNCS format. Submissions not following the required format may be rejected without review.
Anonymization: Papers must be properly anonymized—author names/affiliations must not appear, refer to your own prior work in third person, avoid titles matching public technical reports, and anonymize bibliographies appropriately. Papers not properly anonymized may be rejected without review.
Originality: Submissions must not substantially duplicate published work or be submitted in parallel to other venues with proceedings. Simultaneous submission, previously published work, and plagiarism constitute dishonesty.
Submissions involving human subjects, human-derived data (even anonymized), or that may put humans at risk should:
If your submission deals with vulnerabilities (e.g., software vulnerabilities or hardware design weaknesses), you must discuss in detail the steps already taken or planned to address them, such as coordinated disclosure to vendors.
The same applies for submissions dealing with personally identifiable information (PII) or other sensitive data—explain your data handling and protection procedures. Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee chairs at raid26.pc.chairs@gmail.com.
Note: Papers raising significant ethical or legal concerns may be rejected based on these concerns alone.
Accepted papers will be:
Registration Policy: Each accepted paper requires at least one full author registration. For papers sharing authors, a separate author registration is required for each paper.
No-Show Policy: Papers not presented at the conference will be reported to the publisher and removed from the proceedings.
Ethics: Authors must adhere to Springer's Code of Conduct.
Questions? Contact PC chairs at raid26.pc.chairs@gmail.com.