posted by user: waldenj || 3852 views || tracked by 10 users: [display]

MetriSec 2012 : 8th International Workshop on Security Measurements and Metrics


When Sep 21, 2012 - Sep 21, 2012
Where Lund, Sweden
Submission Deadline May 30, 2012
Notification Due Jun 24, 2012
Final Version Due Jul 1, 2012
Categories    security metrics   empirical research   mining software repositories   information security

Call For Papers

MetriSec 2012
8th International Workshop on

Affiliated with the International Symposium on
Empirical Software Engineering and Measurement (ESEM)

September 21, 2012
Lund, Sweden


Quantitative assessment is a major stumbling block for software and system security. Although some security metrics exist, they are rarely adequate. The engineering importance of metrics is intuitive: you cannot consistently improve what you cannot measure. Economics is an additional driver for security metrics: customers are unlikely to pay a premium for security if they are unable to quantify what they receive.

The goal of the workshop is to foster research into security measurements and metrics and to continue building the community of individuals interested in this field. This year, MetriSec continues its co-location with ESEM, which offers an opportunity for the security metrics folks to meet the metrics community at large.

The organizers solicit original submissions from industry and academic experts on the development and application of repeatable, meaningful measurements in the fields of software and system security. The topics of interest include, but are not limited to:

Security metrics
Security measurement and monitoring
Development of predictive models
Experimental validation of models
Formal theories of security metrics
Security quality assurance
Empirical assessment of security architectures and solutions
Mining data from attack and vulnerability repositories: e.g. CVE, CVSS
Software security metrics
Static analysis metrics
Simulation and statistical analysis
Security risk analysis
Industrial experience


Submission of papers: May 30
Notification to authors: June 24
Submission of camera-ready: July 1


Authors of accepted papers must present their work at the workshop. The proceedings of the workshop will be electronically published by the IEEE.


Submissions are sought in any of the following three categories:

(a) Research papers describing original results, both theoretical and experimental, are solicited in any of the above mentioned topics. Theoretical papers should clearly state the contribution and include some initial validation. Experimental papers are particularly welcome. In this case, authors are required to explicitly state their hypothesis, to detail the methodology used, and to describe the experiment set-up.

(b) Preliminary research results or new ideas can be submitted in the form of short papers.

(c) Industry experience reports are also welcome. Industry papers should have at least one author from industry or government, and will be considered for their industrial relevance.

The page limit for the final proceedings version is 10 pages in double-column format; short papers are limited to 4 pages. Authors should use the IEEE Conference Proceedings Template when preparing their submission. Only PDF files are accepted.


James Walden - Northern Kentucky University (US)
Stephan Neuhaus - ETH Zurich (CH)


Dieter Gollmann, TU Harburg (DE)
Sushil Jajodia, GMU (US)
Guenter Karjoth, IBM (CH)
Fabio Massacci, Uni. Trento (IT)
John McHugh, Dalhousie Uni. (CA)
Riccardo Scandariato, KU Leuven (BE)
Ketil Stolen, SINTEF (NO)
Laurie Williams, NCSU (US)


Andrea Capiluppi, University of East London (UK)
Robert Cunningham, MIT (US)
Michael Gegick (US)
Dieter Gollmann, TU Harburg (DE)
Maureen Doyle, NKU (US)
Christophe Huygens, KU Leuven (BE)
Sushil Jajodia, GMU (US)
Erland Jonsson, Chalmers (SE)
Howard Lipson, CERT (US)
Fabio Massacci, Uni. Trento (IT)
Miles McQueen, Idaho National Laboratory (US)
Andy Meneely, NCSU (US)
Riccardo Scandariato, KU Leuven (BE)
Karen Scarfone, NIST (US)
Yonghee Shin, DePaul University (US)
Ketil Stolen, SINTEF (NO)
Jeff Stuckman, UMD (US)
Laurie Williams, NCSU (US)
Roland Yap, National University of Singapore (SG)
Nicola Zannone, Eindhoven University of Technology (NL)

Related Resources

NordSec 2022   The 27th Nordic Conference on Secure IT Systems
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
ICISS 2022   ACM--2022 The 5th International Conference on Information Science and Systems (ICISS 2022)
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
CSE 2022   10th International Conference on Computational Science and Engineering
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
DMMLACS 2022   3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting