posted by organizer: tomas_sander || 5846 views || tracked by 8 users: [display]



When Oct 24, 2016 - Oct 24, 2016
Where Vienna, Austria
Submission Deadline Aug 5, 2016
Notification Due Sep 5, 2016
Categories    security

Call For Papers


Held in conjunction with 23rd ACM Conference on Computer and Communications Security (CCS)
Hofburg Palace, Vienna, Austria
Oct. 24, 2016


Sharing of cyber-security related information is believed to greatly enhance the ability of organizations to defend themselves against sophisticated attacks. If one organization detects a breach sharing associated security indicators (such as attacker IP addresses, domain names, file hashes etc.) provides valuable, actionable information to other organizations. The analysis of shared security data promises novel insights into emerging attacks. Sharing higher level intelligence about threat actors, the tools they use and mitigations provides defenders with much needed context for better preparing and responding to attacks. In the US and the EU major efforts are underway to strengthen information sharing.

Yet, there are a number of technical and policy challenges to realizing this vision. Which information exactly should be shared? How can privacy and confidentiality be protected? How can we create high-fidelity intelligence from shared data without getting overwhelmed by false positives?

The 3rd Workshop on Information Sharing and Collaborative Security (WISCS 2016) aims to bring together experts and practitioners from academia, industry and government to present innovative research, case studies, and legal and policy issues. The workshop solicits original research papers in these areas, both full and short papers. Workshop proceedings will be published in the ACM Digital Library.

Topics of interest for the workshop include, but are not limited to:

Collaborative intrusion detection
Machine learning on shared information
Big data for cyber-security
Case studies of information sharing
Domain name and IP address blacklists
Collaborative approaches to spear‐phishing, DDoS and other attacks
Privacy and confidentiality
Data deidentification
Cryptographic protocols for collaborative security
Access control for shared information
Scalable security analysis on shared data
Ontologies and standards for sharing security data
UX and behavioral aspects of collaboration
Policy and legal issues
Surveillance issues
Trust models
Attacks on information sharing
Economics of security collaboration

Paper submission due: Aug 5, 2016 (extended from July 22, 2016)
Author notification: September 05, 2016
Camera ready copies due: September 11, 2016
Workshop: October 24, 2016

Freddy Dezeure, CERT-EU
Tomas Sander, Hewlett Packard Enterprise
Richard Struse, DHS
Moti Yung, Columbia University and Snapchat

Florian Kerschbaum, SAP
Erik-Oliver Blass, Airbus Group Innovations

Gail-Joon Ahn, Arizona State University
Rainer Boehme, University of Innsbruck
Julien Bringer, Morpho
Sarah Brown, SecurityLinks
Eric Burger, Georgetown University
Scott Coull, Redjack
Marc Dacier, Qatar Computing Research Institute
Roberto Di Pietro, Nokia Bell Labs
Panos Kampanikis, Cisco
Michael E. Locasto, SRI
Travis Mayberry, Naval Academy
Tom Millar, US CERT
Refik Molva, EURECOM
Guevara Noubir, Northeastern University
Manisha Parmar, NATO Communication and Information Agency
Pawel Pawlinski, CERT Polska
Roberto Perdisci, University of Georgia
Thomas Schreck, Siemens
Oscar Serrano, NATO Communication and Information Agency
Stuart Shapiro, MITRE
Jose Such, Lancaster University
Paul Vixie, Farsight Security

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Regular submissions should be at most 10 pages in the ACM double-column format including bibliography, but excluding well-marked appendices, and at most 12 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Submissions should not be anonymized. The workshop will also consider short submissions of up to 4 pages for case studies, results that are preliminary or that require only a few pages to describe. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a short paper (4 proceedings pages).

Submissions are to be made to the submission web site at . You will be requested to upload the file of your paper (in PDF format only). Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by August 05, 2016 to be considered. Notification of acceptance or rejection will be sent to authors by September 05, 2016. The camera ready versions must be prepared by September 11, 2016 (firm). Proceedings of the workshop will be published by ACM on a CD, available to the workshop attendees. Papers will be included in the ACM Digital Library, with a specific ISBN. Each accepted paper must be presented by an author, who will have to be registered by the early-bird registration deadline.

Please contact the program co-chairs Florian Kerschbaum and Erik-Oliver Blass ( with any questions.

Related Resources

EI ISCSIC 2020   2020 4th International Symposium on Computer Science and Intelligent Control(ISCSIC 2020)
SP 2020   IEEE Symposium on Security and Privacy
ACM--IMMS--Ei, Scopus 2020   ACM--2020 3rd International Conference on Information Management and Management Science (IMMS 2020)--Ei Compendex, Scopus
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
IMMS--ACM, Ei, Scopus 2020   ACM--2020 3rd International Conference on Information Management and Management Science (IMMS 2020)--Ei Compendex, Scopus
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
icist 2020   acm- 10th International Conference on Information Systems and Technologies
ICSS 2019   5th International Conference on Software Security