posted by system || 3904 views || tracked by 4 users: [display]

WSCS 2012 : Workshop on Semantic Computing and Security

FacebookTwitterLinkedInGoogle

Link: http://ieee-security.org/TC/SPW2012/wscs-website/wscs.php
 
When May 24, 2012 - May 24, 2012
Where San Francisco, CA USA
Submission Deadline Feb 28, 2012
Notification Due Mar 31, 2012
Final Version Due Apr 15, 2012
 

Call For Papers

The IEEE Computer Society's Technical Committees:
Security and Privacy (TCSP)
Semantic Computing (TCSEM)
Keynote Speaker: Jeanette Wing
President's Professor of Computer Science and Department Head, Computer Science Department, Carnegie Mellon University

This workshop follows the successful September 2011 workshop at the International Semantic Computing Symposium. This new workshop will explore additional topics and allow semantic computing researchers to have more opportunity to interact with security researchers.

Semantic Computing technologies derive and use semantics from content, where “content” is wide-ranging: video, audio, text, conversation, software, devices, actions, behavior, etc. Security technology encompasses the specification of secure behavior as well as the detection of insecure behavior over computer networks. The two disciplines come together in this new and interesting combination, in a synergy-seeking, cutting-edge workshop. The delimited notions of semantics used within Security and Privacy provide a well-defined and as yet unstudied domain for semantic modeling, automated semantic interpretation, and inference, with clear practical uses and opportunities for novel and imaginative research.

The workshop on Semantic Computing and Security addresses:
deriving semantics from data used for security and privacy research;
semantic verification of network activity; and
inferring the semantics of malicious free-form data, such as email and web pages.
Topics of interest include but are not limited to:
Network dataset curation through semantic derivation
Semantic MediaWiki for vulnerability sharing and detecting emergent security properties
Network security semantics, dynamic classification
Inferred semantics of malicious code
Semantic verification of network operations
Semantic specification and analysis of security experiment design
Semantic analysis of access control policies
Semantics of data acquisition and computation provenance
Semantic analysis of malware communication
Semantics-aware trust management

Related Resources

ISM 2018   IEEE International Symposium on Multimedia
CASCCIT 2018   On Context-Aware Security in Cloud Computing and Internet of Things 2018
CASCCIT 2018   On Context-Aware Security in Cloud Computing and Internet of Things 2018
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ISWC 2018   17th International Semantic Web Conference
WI 2018   2018 IEEE/WIC/ACM International Conference on Web Intelligence
CHI 2019   The ACM CHI Conference on Human Factors in Computing Systems
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems
UCC 2018   11th IEEE/ACM International Conference on Utility and Cloud Computing
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy