| |||||||||||||
RAID 2016 : 19th International Symposium on Research in Attacks, Intrusions and DefensesConference Series : Recent Advances in Intrusion Detection | |||||||||||||
Link: http://www.raid2016.org/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
--------------------------------------------------------
Call for Papers: RAID 2016 19th International Symposium on Research in Attacks, Intrusions and Defenses Paris, France, September 19-21, 2016 http://www.raid2016.org/ -------------------------------------------------------- Important Dates --------------- Paper Submission Deadline: April 1, 2016 (5PM, UTC Time) Notification to Authors: June 3, 2016 Poster Submission Deadline: June 14, 2016 Poster Acceptance Notification: July 1, 2016 Camera Ready Submission Deadline: July 8, 2016 Final Version of Accepted Posters: September 5, 2016 ---------------- The 19th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2016) aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. The conference will be held September 19-21 in Paris, France. Research papers on all topics related to cyber attacks, intrusions or defenses are within scope, including papers on: * Malware and unwanted software * Mobile and Web security and privacy * Cloud computing security * Computer and network security * Denial-of-Service attacks * Formal models, analysis, and standards * Vulnerability analysis * Secure software development * Machine learning for security * Computer security visualization techniques * Cyber crime and underground economies * Hardware security * Program analysis and reverse engineering * Digital forensics * Usable security and privacy * Intrusion detection and prevention * Cyber physical systems * Security measurement studies * Security and privacy of the Internet of Things * Threats against critical infrastructures and mitigation thereof * Cyber intelligence techniques and threats intel sharing Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of the experimental results. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt. Submission Guidelines --------------------- Reviewing will be double-blind, meaning the authors' identities will be hidden from the reviewers. All papers must be appropriately anonymized: author names or affiliations must not appear in the submission, you must refer to your own prior work in the third person, you should not give the paper a title that corresponds to a publicly available technical report, and should anonymize the bibliographic section in an appropriate manner, etc. Papers that are not anonymized will not be reviewed. RAID abides with policies for plagiarism, submission confidentiality, reviewer anonymity, and prior and concurrent paper submission that mirror those of the ACM (see http://www.acm.org/publications/policies/). For RAID 2016, we invite two types of submissions: 1. *Full papers* papers presenting mature and novel research results. Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices. 2. *Poster abstracts* describing works in progress, or innovative ideas not mature enough to be presented as a full paper. The poster track will provide an opportunity to present early-stage work and receive feedback from the community, especially on thought-provoking or controversial work, approaches, or ideas from students. Posters are submitted for review in the form of an extended abstract that has to be formatted in LNCS-style and not exceed 1 page in length, with a PDF draft of the proposed poster included as page 2 of the submission. In addition, poster titles should always start with the phrase 'Poster Abstract:'. Accepted posters will be presented at the symposium in a separate session. Authors of accepted full papers are also encouraged to submit and present posters of their paper in the poster session. Note that the poster abstracts have a separate deadline from the full papers and will not be included in the proceedings. For accepted papers, at least one of the authors must attend the conference to present the paper. Submissions must not substantially duplicate work that has already been published elsewhere or submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. Papers accepted by the Program Committee will be presented at RAID 2016 and included in the Symposium's proceedings published by Springer in its Lecture Notes in Computer Science series. If needed, we will grant accepted papers up to two additional pages to address comments from the reviewers. A summary of the reviews will be published alongside each accepted paper. Authors who are unsure whether their submissions might meet these guidelines, or who have specific questions about the guidelines, are welcome to contact the program committee co-chairs at raid2016-chairs[at]cs.unc.edu. Organizing Committee: --------------------- General Chair: Joaquin Garcia-Alfaro, Telecom SudParis, France PC Chair: Fabian Monrose, University of North Carolina at Chapel Hill, US PC Co-Chair: Marc Dacier, Qatar Computing Research Institute / HBKU, Qatar Publicity Chair: Yazan Boshmaf, Qatar Computing Research Institute / HBKU, Qatar Sponsor Chair: Herve Debar, Telecom SudParis, France Local Arrangement Chair: Gregory Blanc, Telecom SudParis, France Local Arrangement Co-Chair: Francoise Abad, Telecom SudParis, France Webmaster: Christophe Kiennert, Telecom SudParis, France Program Committee: Magnus Almgren, Chalmers University, Sweden Johanna Amann, International Computer Science Institute, US Manos Antonakakis, Georgia Institute of Technology, US Michael Bailey, University of Illinois at Urbana-Champaign, US Lucas Ballard, Google, US Leyla Bilge, Symantec, US Lucas Davi, Technische Universitat Darmstadt, Germany Herve Debar, Telecom SudParis, France Petros Efstathopoulos, Symantec, US Manuel Egele, Boston University, US William Enck, North Carolina State University, US Vasileios Kemerlis, Brown University, US Andrea Lanzi, University of Milan, Italy Pavel Laskov, Huawei European Research Center, Germany Zhiqiang Lin, University of Texas at Dallas, US Daniela Oliveira, University of Florida, US Roberto Perdisci, University of Georgia, US Michalis Polychronakis, Stony Brook University, US Konrad Rieck, TU Braunschweig, Germany Christian Rossow, Saarland University, Germany Stelios Sidiroglou-Douskos, Massachusetts Institute of Technology, US Kapil Singh, IBM T.J. Watson, US Kevin Snow, Zeropoint, US Cynthia Sturton, University of North Carolina at Chapel Hill, US Dongyan Xu, Purdue University, US |
|