posted by organizer: usenixcfp || 1672 views || tracked by 8 users: [display]

CSET 2016 : 9th Workshop on Cyber Security Experimentation and Test

FacebookTwitterLinkedInGoogle

Link: http://usenix.org/conference/cset16/call-for-papers
 
When Aug 8, 2016 - Aug 8, 2016
Where Austin, TX
Submission Deadline May 3, 2016
Notification Due Jun 14, 2016
Final Version Due Jul 12, 2016
Categories    USENIX   open access   cyber security
 

Call For Papers

CSET '16 will be co-located with the 25th USENIX Security Symposium (USENIX Security '16) and take place on Monday, August 8, 2016.

Important Dates:
* Submissions due: Tuesday, May 3, 2016, 11:59 pm PDT (no extensions)
* Notification to authors: Tuesday, June 14, 2016
* Final papers due: Tuesday, July 12, 2016


Overview:
The CSET workshop invites submissions on cyber security evaluation, experimentation, measurement, metrics, data, simulations, and testbeds.

The science of cyber security poses significant challenges. For example, experiments must recreate relevant, realistic features in order to be meaningful, yet identifying those features and modeling them is very difficult. Repeatability and measurement accuracy are essential in any scientific experiment, yet hard to achieve in practice. Few security-relevant datasets are publicly available for research use and little is understood about what "good datasets" look like. Finally, cyber security experiments carry significant risks if not properly contained and controlled, yet often require some degree of interaction with the larger world in order to be useful.

Meeting these challenges requires transformational advances, including understanding the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.


Topics:

Topics of interest include but are not limited to:
* Science of cyber security: e.g., experiences with and discussions of experimental methodologies; experiment design and conduct addressing cyber security challenges.
* Measurement and metrics: e.g., what are useful or valid metrics, test cases, and benchmarks? How do we know? How does measurement interact with (or interfere with) evaluation?
* Testbeds and experimental infrastructure: e.g., tools for improving speed and fidelity of testbed configuration; sensors for robust data collection with minimal testbed artifacts; support for interconnected non-IT systems such as telecommunications or industrial control.
* Simulations and emulations: e.g., what makes good ones? How do they scale (up or down)?
* Data sets: e.g., what makes good data sets? How do we know? How do we compare data sets? How do we collect new ones or generate derived ones? How do they hold up over time?
* Ethics of cyber security research: e.g., experiences balancing stakeholder considerations; frameworks for evaluating the ethics of cyber security experiments.

Special note: Papers that primarily focus on computer security education are likely a better fit for the new ASE '16 workshop, also co-located with the USENIX Security Symposium. Authors of education-centered papers should strongly consider submitting their work to ASE.


Workshop Format:
Because of the complex and open nature of the subject matter, CSET '16 is designed to be a workshop in the traditional sense. Presentations are expected to be interactive, and presenters should assume that a substantial amount of time may be given to questions and audience discussion. Audience participation is encouraged. To ensure a productive workshop environment, attendance will be limited to 80 participants.


Submission Instructions:
Research papers and position papers are welcome as submissions. Research papers should have a clearly stated methodology including a hypothesis and experiments designed to prove or disprove the hypothesis. Position papers, particularly those that critique past work, should present detailed solutions, either proposed or implemented. Submissions that recount experiences (e.g., from experiments or deployments) are especially desired; these should highlight takeaways and lessons learned that might help researchers in the future. For all submissions, the program committee will give greater weight to papers that lend themselves to interactive discussion among attendees.

Submissions must be no longer than 8 pages including all tables, figures, and references. Text should be formatted in two columns on 8.5"x11" paper using 10-point type on 12-point leading ("single-spaced"), with the text block being no more than 6.5"x9". Text outside the 6.5"x9" block will be ignored. Authors are encouraged to use the LaTeX and Word guides from the USENIX paper templates page. The review process will be single-blind; submissions do not need to be anonymized.

All papers must be submitted in PDF format via the Web submission form, which will be available here soon.

All papers will be available online to registered attendees before the workshop. If your accepted paper should not be published prior to the event, please notify production@usenix.org. The papers will be available online to everyone beginning on the day of the workshop. At least one author from every accepted paper must attend the workshop and present the paper.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. USENIX, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. See the USENIX Conference Submissions Policy for details. Questions? Contact your program co-chairs, cset16chairs@usenix.org, or the USENIX office, submissions-policy@usenix.org.

Papers accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the USENIX CSET '16 Web site; rejected submissions will be permanently treated as confidential.

Related Resources

CSET 2017   10th USENIX Workshop on Cyber Security Experimentation and Test
DMCS 2017   DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
eCrime 2018   13th Symposium on Electronic Crime Research
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
BDA4CID 2017   2017 International Workshop on Big Data Analytics for Cyber Intelligence and Defense
DATE 2017   Design, Automation, and Test in Europe
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ICCS - IEEE 2017   The UND-SCIEI International Conference on Cyber-Security in Aerospace, Computer Science, and Electrical Engineering (ICCS 2017)--IEEE, Ei Compendex and Scopus
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus