posted by user: boshmaf || 9875 views || tracked by 26 users: [display]

RAID 2016 : 19th International Symposium on Research in Attacks, Intrusions and Defenses

FacebookTwitterLinkedInGoogle


Conference Series : Recent Advances in Intrusion Detection
 
Link: http://www.raid2016.org/
 
When Sep 19, 2016 - Sep 21, 2016
Where Paris, France
Submission Deadline Apr 1, 2016
Notification Due Jun 3, 2016
Final Version Due Jul 8, 2016
 

Call For Papers

--------------------------------------------------------

Call for Papers:

RAID 2016

19th International Symposium on Research
in Attacks, Intrusions and Defenses

Paris, France, September 19-21, 2016
http://www.raid2016.org/

--------------------------------------------------------

Important Dates
---------------

Paper Submission Deadline: April 1, 2016 (5PM, UTC Time)
Notification to Authors: June 3, 2016
Poster Submission Deadline: June 14, 2016
Poster Acceptance Notification: July 1, 2016
Camera Ready Submission Deadline: July 8, 2016
Final Version of Accepted Posters: September 5, 2016

----------------

The 19th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID 2016) aims at bringing together
leading researchers and practitioners from academia, government,
and industry to discuss novel research contributions related to
computer and information security. The conference will be held
September 19-21 in Paris, France.

Research papers on all topics related to cyber attacks, intrusions or
defenses are within scope, including papers on:

* Malware and unwanted software
* Mobile and Web security and privacy
* Cloud computing security
* Computer and network security
* Denial-of-Service attacks
* Formal models, analysis, and standards
* Vulnerability analysis
* Secure software development
* Machine learning for security
* Computer security visualization techniques
* Cyber crime and underground economies
* Hardware security
* Program analysis and reverse engineering
* Digital forensics
* Usable security and privacy
* Intrusion detection and prevention
* Cyber physical systems
* Security measurement studies
* Security and privacy of the Internet of Things
* Threats against critical infrastructures and mitigation thereof
* Cyber intelligence techniques and threats intel sharing

Papers will be judged on novelty, significance, correctness, and
clarity. We expect all papers to provide enough detail to enable
reproducibility of the experimental results. We encourage papers that
bridge research in different communities. We also welcome experience
papers that clearly articulate lessons learnt.

Submission Guidelines
---------------------

Reviewing will be double-blind, meaning the authors' identities will
be hidden from the reviewers. All papers must be appropriately
anonymized: author names or affiliations must not appear in the
submission, you must refer to your own prior work in the third person,
you should not give the paper a title that corresponds to a publicly
available technical report, and should anonymize the bibliographic
section in an appropriate manner, etc. Papers that are not anonymized
will not be reviewed. RAID abides with policies for plagiarism,
submission confidentiality, reviewer anonymity, and prior and
concurrent paper submission that mirror those of the ACM (see
http://www.acm.org/publications/policies/).

For RAID 2016, we invite two types of submissions:

1. *Full papers* papers presenting mature and novel research results.
Each paper must include an abstract and a list of keywords, and must
not exceed 20 pages in total length, formatted in LNCS-style and
including the bibliography and any appendices.

2. *Poster abstracts* describing works in progress, or innovative
ideas not mature enough to be presented as a full paper. The poster
track will provide an opportunity to present early-stage work and
receive feedback from the community, especially on thought-provoking
or controversial work, approaches, or ideas from students. Posters are
submitted for review in the form of an extended abstract that has to
be formatted in LNCS-style and not exceed 1 page in length, with a PDF
draft of the proposed poster included as page 2 of the submission. In
addition, poster titles should always start with the phrase 'Poster
Abstract:'. Accepted posters will be presented at the symposium in a
separate session. Authors of accepted full papers are also encouraged
to submit and present posters of their paper in the poster session.

Note that the poster abstracts have a separate deadline from the full
papers and will not be included in the proceedings.

For accepted papers, at least one of the authors must attend the
conference to present the paper. Submissions must not substantially
duplicate work that has already been published elsewhere or submitted
in parallel to a journal or to any other conference or workshop with
proceedings. Simultaneous submission of the same work to multiple
venues, submission of previously published work, and plagiarism
constitute dishonesty or fraud. RAID, like other scientific and
technical conferences and journals, prohibits these practices and may,
on the recommendation of the program chair, take action against
authors who have committed them.

Papers accepted by the Program Committee will be presented at RAID
2016 and included in the Symposium's proceedings published by Springer
in its Lecture Notes in Computer Science series. If needed, we will
grant accepted papers up to two additional pages to address comments
from the reviewers. A summary of the reviews will be published
alongside each accepted paper.

Authors who are unsure whether their submissions might meet these
guidelines, or who have specific questions about the guidelines, are
welcome to contact the program committee co-chairs at
raid2016-chairs[at]cs.unc.edu.


Organizing Committee:
---------------------

General Chair:
Joaquin Garcia-Alfaro, Telecom SudParis, France
PC Chair:
Fabian Monrose, University of North Carolina at Chapel Hill, US
PC Co-Chair:
Marc Dacier, Qatar Computing Research Institute / HBKU, Qatar
Publicity Chair:
Yazan Boshmaf, Qatar Computing Research Institute / HBKU, Qatar
Sponsor Chair:
Herve Debar, Telecom SudParis, France
Local Arrangement Chair:
Gregory Blanc, Telecom SudParis, France
Local Arrangement Co-Chair:
Francoise Abad, Telecom SudParis, France
Webmaster:
Christophe Kiennert, Telecom SudParis, France

Program Committee:
Magnus Almgren, Chalmers University, Sweden
Johanna Amann, International Computer Science Institute, US
Manos Antonakakis, Georgia Institute of Technology, US
Michael Bailey, University of Illinois at Urbana-Champaign, US
Lucas Ballard, Google, US
Leyla Bilge, Symantec, US
Lucas Davi, Technische Universitat Darmstadt, Germany
Herve Debar, Telecom SudParis, France
Petros Efstathopoulos, Symantec, US
Manuel Egele, Boston University, US
William Enck, North Carolina State University, US
Vasileios Kemerlis, Brown University, US
Andrea Lanzi, University of Milan, Italy
Pavel Laskov, Huawei European Research Center, Germany
Zhiqiang Lin, University of Texas at Dallas, US
Daniela Oliveira, University of Florida, US
Roberto Perdisci, University of Georgia, US
Michalis Polychronakis, Stony Brook University, US
Konrad Rieck, TU Braunschweig, Germany
Christian Rossow, Saarland University, Germany
Stelios Sidiroglou-Douskos, Massachusetts Institute of Technology, US
Kapil Singh, IBM T.J. Watson, US
Kevin Snow, Zeropoint, US
Cynthia Sturton, University of North Carolina at Chapel Hill, US
Dongyan Xu, Purdue University, US

Related Resources

RAID 2024   The 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2024)
ADIoT 2024   The 7th International Conference on Attacks and Defenses for Internet-of-Things
SIGIR 2025   The 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
DIMVA 2025   22nd Conference on Detection of Intrusions and Malware & Vulnerability Assessment (cycle 2)
TRS 2025   Transportation Research Symposium
dimva 2025   Conference on Detection of Intrusions and Malware & Vulnerability Assessment
FLAIRS 2025   Florida Artificial Intelligence Research Society
IWBF 2025   13th International Workshop on Biometrics and Forensics 2023
NAACL-SRW 2025   NAACL Student Research Workshop (SRW) 2025
ICEER 2025   2025 12th International Conference on Energy and Environment Research (ICEER 2025)