RAID: Recent Advances in Intrusion Detection

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RAID 2016 19th International Symposium on Research in Attacks, Intrusions and Defenses
Sep 19, 2016 - Sep 21, 2016 Paris, France Apr 1, 2016
RAID 2015 18th International Symposium on Research in Attacks, Intrusions and Defenses
Nov 2, 2015 - Nov 4, 2015 Kyoto, Japan Jun 5, 2015
RAID 2014 17th International Symposium on Research in Attacks, Intrusions and Defenses
Sep 17, 2014 - Sep 19, 2014 Gothenburg, Sweden Apr 9, 2014
RAID 2013 Research in Attacks, Intrusions and Defenses (RAID) Symposium
Oct 23, 2013 - Oct 25, 2013 Saint Lucia Apr 1, 2013
RAID 2012 International Symposium on Research in Attacks, Intrusions and Defenses
Sep 12, 2012 - Sep 12, 2012 Amsterdam Apr 6, 2012
RAID 2011 14th International Symposium on Recent Advances in Intrusion Detection
Sep 20, 2011 - Sep 21, 2011 Menlo Park, CA Apr 7, 2011
RAID 2010 The 13th International Symposium on Recent Advances in Intrusion Detection
Sep 15, 2010 - Sep 17, 2010 Ottawa, Canada Apr 21, 2010
RAID 2009 12th International Symposium on Recent Advances in Intrusion Detection 2009
Sep 23, 2009 - Sep 25, 2009 Saint Malo, France Apr 5, 2009
 
 

Present CFP : 2016

--------------------------------------------------------

Call for Papers:

RAID 2016

19th International Symposium on Research
in Attacks, Intrusions and Defenses

Paris, France, September 19-21, 2016
http://www.raid2016.org/

--------------------------------------------------------

Important Dates
---------------

Paper Submission Deadline: April 1, 2016 (5PM, UTC Time)
Notification to Authors: June 3, 2016
Poster Submission Deadline: June 14, 2016
Poster Acceptance Notification: July 1, 2016
Camera Ready Submission Deadline: July 8, 2016
Final Version of Accepted Posters: September 5, 2016

----------------

The 19th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID 2016) aims at bringing together
leading researchers and practitioners from academia, government,
and industry to discuss novel research contributions related to
computer and information security. The conference will be held
September 19-21 in Paris, France.

Research papers on all topics related to cyber attacks, intrusions or
defenses are within scope, including papers on:

* Malware and unwanted software
* Mobile and Web security and privacy
* Cloud computing security
* Computer and network security
* Denial-of-Service attacks
* Formal models, analysis, and standards
* Vulnerability analysis
* Secure software development
* Machine learning for security
* Computer security visualization techniques
* Cyber crime and underground economies
* Hardware security
* Program analysis and reverse engineering
* Digital forensics
* Usable security and privacy
* Intrusion detection and prevention
* Cyber physical systems
* Security measurement studies
* Security and privacy of the Internet of Things
* Threats against critical infrastructures and mitigation thereof
* Cyber intelligence techniques and threats intel sharing

Papers will be judged on novelty, significance, correctness, and
clarity. We expect all papers to provide enough detail to enable
reproducibility of the experimental results. We encourage papers that
bridge research in different communities. We also welcome experience
papers that clearly articulate lessons learnt.

Submission Guidelines
---------------------

Reviewing will be double-blind, meaning the authors' identities will
be hidden from the reviewers. All papers must be appropriately
anonymized: author names or affiliations must not appear in the
submission, you must refer to your own prior work in the third person,
you should not give the paper a title that corresponds to a publicly
available technical report, and should anonymize the bibliographic
section in an appropriate manner, etc. Papers that are not anonymized
will not be reviewed. RAID abides with policies for plagiarism,
submission confidentiality, reviewer anonymity, and prior and
concurrent paper submission that mirror those of the ACM (see
http://www.acm.org/publications/policies/).

For RAID 2016, we invite two types of submissions:

1. *Full papers* papers presenting mature and novel research results.
Each paper must include an abstract and a list of keywords, and must
not exceed 20 pages in total length, formatted in LNCS-style and
including the bibliography and any appendices.

2. *Poster abstracts* describing works in progress, or innovative
ideas not mature enough to be presented as a full paper. The poster
track will provide an opportunity to present early-stage work and
receive feedback from the community, especially on thought-provoking
or controversial work, approaches, or ideas from students. Posters are
submitted for review in the form of an extended abstract that has to
be formatted in LNCS-style and not exceed 1 page in length, with a PDF
draft of the proposed poster included as page 2 of the submission. In
addition, poster titles should always start with the phrase 'Poster
Abstract:'. Accepted posters will be presented at the symposium in a
separate session. Authors of accepted full papers are also encouraged
to submit and present posters of their paper in the poster session.

Note that the poster abstracts have a separate deadline from the full
papers and will not be included in the proceedings.

For accepted papers, at least one of the authors must attend the
conference to present the paper. Submissions must not substantially
duplicate work that has already been published elsewhere or submitted
in parallel to a journal or to any other conference or workshop with
proceedings. Simultaneous submission of the same work to multiple
venues, submission of previously published work, and plagiarism
constitute dishonesty or fraud. RAID, like other scientific and
technical conferences and journals, prohibits these practices and may,
on the recommendation of the program chair, take action against
authors who have committed them.

Papers accepted by the Program Committee will be presented at RAID
2016 and included in the Symposium's proceedings published by Springer
in its Lecture Notes in Computer Science series. If needed, we will
grant accepted papers up to two additional pages to address comments
from the reviewers. A summary of the reviews will be published
alongside each accepted paper.

Authors who are unsure whether their submissions might meet these
guidelines, or who have specific questions about the guidelines, are
welcome to contact the program committee co-chairs at
raid2016-chairs[at]cs.unc.edu.


Organizing Committee:
---------------------

General Chair:
Joaquin Garcia-Alfaro, Telecom SudParis, France
PC Chair:
Fabian Monrose, University of North Carolina at Chapel Hill, US
PC Co-Chair:
Marc Dacier, Qatar Computing Research Institute / HBKU, Qatar
Publicity Chair:
Yazan Boshmaf, Qatar Computing Research Institute / HBKU, Qatar
Sponsor Chair:
Herve Debar, Telecom SudParis, France
Local Arrangement Chair:
Gregory Blanc, Telecom SudParis, France
Local Arrangement Co-Chair:
Francoise Abad, Telecom SudParis, France
Webmaster:
Christophe Kiennert, Telecom SudParis, France

Program Committee:
Magnus Almgren, Chalmers University, Sweden
Johanna Amann, International Computer Science Institute, US
Manos Antonakakis, Georgia Institute of Technology, US
Michael Bailey, University of Illinois at Urbana-Champaign, US
Lucas Ballard, Google, US
Leyla Bilge, Symantec, US
Lucas Davi, Technische Universitat Darmstadt, Germany
Herve Debar, Telecom SudParis, France
Petros Efstathopoulos, Symantec, US
Manuel Egele, Boston University, US
William Enck, North Carolina State University, US
Vasileios Kemerlis, Brown University, US
Andrea Lanzi, University of Milan, Italy
Pavel Laskov, Huawei European Research Center, Germany
Zhiqiang Lin, University of Texas at Dallas, US
Daniela Oliveira, University of Florida, US
Roberto Perdisci, University of Georgia, US
Michalis Polychronakis, Stony Brook University, US
Konrad Rieck, TU Braunschweig, Germany
Christian Rossow, Saarland University, Germany
Stelios Sidiroglou-Douskos, Massachusetts Institute of Technology, US
Kapil Singh, IBM T.J. Watson, US
Kevin Snow, Zeropoint, US
Cynthia Sturton, University of North Carolina at Chapel Hill, US
Dongyan Xu, Purdue University, US
 

Related Resources

SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
DIMVA 2016   13th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment
BigData-FAB 2016   Special Issue on “Big Data and Machine Learning in Finance, Accounting and Business” in Electronic Commerce Research (Springer)
EACL SRW 2017   EACL 2017 Student Research Workshop
WTAMS 2016   The 1st International Workshop on Targeted Attacks and Mitigation Strategies
AsianHOST 2016   IEEE Asian Hardware-Oriented Security and Trust Symposium 2016
NFM 2017   The 9th NASA Formal Methods Symposium
ICCCRI 2017   5th International Conference on Cloud Computing Research and Innovation (ICCCRI 2017)
ICGSC 2017   International Conference on Green Supply Chain
ISF 2017   37th International Symposium on Forecasting