IWSMR 2022 : 4th International Workshop on Information Security Methodology and Replication Studies
Call For Papers
4th International Workshop on Information Security Methodology and Replication Studies (IWSMR 2022)
to be held in conjunction with the
17th International Conference on Availability, Reliability and Security (ARES).
August 23 – August 26, 2022 (Vienna)
Submission Deadline **May 25, 2022** (EXTENDED!)
Author Notification June 9, 2022
Proceedings Version June 19, 2022
ARES Conference August 23 – August 26, 2022
In recent years, research started to focus on the scientific
fundamentals of information security. These fundamentals include several
important aspects such as the unified description of attacks and
countermeasures, the reproducibility of experiments and means to achieve
reproducibility, the sharing of research data and code, the discussion
of quality criteria for experiments and the design and implementation of
The related academic publications contributed to the advancement of
information security research, e.g. by making research contributions
easier to compare. Moreover, work on terminology and taxonomy addressed
redundancies and unified the understanding between different sub-domains
of information security.
This workshop desires to foster the progress in research on the
scientific methodology of information security, to improve the links
between sub-domains of information security research and to advance the
discussion on the scientific methodology in information security.
Moreover does this workshop welcome submissions that evaluate existing
research results by reproducing experiments.
Topics of interest include, but are not limited to
• Surveys of scientific methodology in information security.
• Fundamentals for a `science of security'.
• Discussion of links/similarities between scientific fundamentals of
information security and other research domains, such as Economics,
Psychology, Biology, Physics or Chemistry (but no papers specific to
• Evaluation and extension of existing taxonomies and proposals for new
taxonomies in cyber security.
• Data collection and measurement.
• Work that unifies terminological inconsistencies in cyber security.
• Work that reproduces existing experiments, i.e. that
confirms/disproves experimental results or that shows how replication
platforms can be realized in information security.
• Work that discusses the underlying criteria for the design and
evaluation for cyber security research testbeds.
• Evaluation of the novelty of research contributions and handling of
• Methodology in network security, cryptography, information hiding, IoT
security, system security, digital forensics, and other sub-disciplines
of information security.
• Methodology for privacy, information sharing and collaborative work in
the context of information security.
• “Open science” for cyber security.
• History of information security.
• Scientometric analyses, e.g. citation behavior, in information security.
• Policy issues that influence cyber security research.
Steffen Wendzel, Hochschule Worms, Germany
Luca Caviglione, Inst. Appl. Math. & Inf. Techn. (IMATI), National
Research Council (CNR), Italy
Alessandro Checco, University of Sheffield, United Kingdom
Aleksandra Mileva, University Goce Delcev, Macedonia
Jean-Francois Lalande, CentraleSupélec, France
Wojciech Mazurczyk, Warsaw University of Technology, Poland
The submission guidelines valid for the workshop are the same as for the
ARES conference. They can be found at