posted by user: jstaddon || 4414 views || tracked by 16 users: [display]

AISec 2009 : Artificial Intelligence and Security

FacebookTwitterLinkedInGoogle


Conference Series : Security and Artificial Intelligence
 
Link: http://www.aisec.info
 
When Nov 9, 2009 - Nov 9, 2009
Where Chicago, IL
Submission Deadline Jun 19, 2009
Notification Due Aug 16, 2009
Final Version Due Aug 25, 2009
Categories    data mining   machine learning   security   privacy
 

Call For Papers

Scope

The ubiquitous nature of information and communication today is often cited as the cause of many security and privacy problems including identity and reputation management, viruses/worms and phishing/pharming. There is strong evidence, however, that this abundance of information and communication has at least as many security and privacy benefits as costs. Consider for example, the use of machine learning algorithms to detect network intrusions, crowd-based approaches to anonymous communication and the use of data mining algorithms to determine content sanitization. All of these efforts benefit from recent advances in AI, which have often been driven by increases in the amount of available data.

To fully realize the security and privacy benefits of today's ubiquitous information, the security community needs expertise in the tools and techniques for managing that information, namely, artificial intelligence technology, and the AI community needs an understanding of security and privacy problems. To facilitate an exchange of ideas between these two communities, we are holding the second workshop in "AISec" in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS), the new field of security and privacy solutions that leverage AI technologies. Our full-day workshop will be a mix of technical papers and position papers with ideas for AISec's future.

Topics of interest include, but are not limited to:
Spam detection
Botnet detection
Intrusion detection
Malware identification
Insider threat detection
Privacy-preserving data mining
Inference detection and control
Design and analysis of CAPTCHAs
Phishing detection and prevention
AI approaches to trust and reputation
Incentives in security/privacy systems
Machine learning techniques for optimizing user experience
Vulnerability testing through intelligent probing (e.g. fuzzing)
Content-driven security policy management & access control
Techniques and methods for generating training and test sets
Anomalous behavior detection (e.g. for the purposes of fraud prevention, authentication)

Paper Submission

We invite original research papers describing significant results using AI techniques to address security and/or privacy problems. We also invite position papers discussing the role of AI in security and privacy. Submitted papers may not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference with proceedings.

Research submissions should be at most 12 pages excluding the bibliography and well-marked appendices using single-column, 11-point font and reasonable margins on letter-size paper, and at most 15 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Position papers should be at most 6 pages long in total using the same guidelines as above. Submissions need not be anonymized.

Submissions can be made through EasyChair at the following web site: http://www.easychair.org/conferences/?conf=aisec09

Dates

Submission deadline: June 19, 2009
Author notifications: August 16, 2009
Camera ready papers due: August 25, 2008 (Firm deadline)
Workshop: November 9, 2009

Publication

Authors of accepted papers are expected to give full presentations at the workshop. Proceedings will be published by the ACM.

Program chairs:

Dirk Balfanz (Google)
Jessica Staddon (Palo Alto Research Center)
Program Committee:

Adam Barth (U. C. Berkeley)
Alvaro A. Cardenas (U. C. Berkeley)
Kamalika Chaudhuri (U. C. San Diego)
George Danezis (Microsoft)
Luca de Alfaro (U. C. Santa Cruz)
Philippe Golle (PARC)
Rachel Greenstadt (Drexel)
Virgil Griffith (Caltech)
Tad Hogg (HP Labs)
Marius Kloft (Fraunhofer)
Pavel Laskov (Fraunhofer)
Barry O'Sullivan (University College, Cork)
Lisa Purvis (Xerox)
Zulfikar Ramzan (Symantec)
Benjamin Rubinstein (U. C. Berkeley)
Sal Stolfo (Columbia University)
Paul Thompson (Dartmouth)
Shobha Venkataraman (AT&T Research)

Related Resources

IJCAI 2018   International Joint Conferences on Artificial Intelligence Organization
PAKDD 2018   The 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining
ECCV 2018   European Conference on Computer Vision
SDM 2018   SIAM International Conference on Data Mining
ACL 2018   56th Annual Meeting of the Association for Computational Linguistics
ICPR 2018   24th International Conference on Pattern Recognition
AIAI 2018   14th Artificial Intelligence Applications and Innovations 2018
GECCO 2018   Genetic and Evolutionary Computation Conference
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
DCAI 2018   15th International Conference on Distributed Computing and Artificial Intelligence