posted by user: GraMSec || 5057 views || tracked by 5 users: [display]

GraMSec 2019 : The Sixth International Workshop on Graphical Models for Security


When Jun 24, 2019 - Jun 24, 2019
Where Hoboken, NJ, USA
Submission Deadline Apr 5, 2019
Notification Due May 3, 2019
Categories    security   social networks   machine learning   cyber security

Call For Papers

****************************** CALL FOR PAPERS ******************************

GraMSec 2019: The Sixth International Workshop on Graphical Models for Security
Hoboken, NJ, USA - June 24, 2019
Co-located with CSF 2019

*Submissions received by April 5 receive priority consideration*
*Papers not accepted for presentation a the workshop may be considered for publication in post-proceedings after major revision*

The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security researchers, as well as security professionals from the industry and government, have proposed various graphical security models, metrics, and measurements. Graphical models are used to capture different security facets and address a range of challenges including security assessment, automated defence, secure services composition, security policy validation, and verification. For example, attack graphs, attack trees, attackñdefence trees, and attack countermeasure trees represent possible ways of attacking and defending a system while misuse cases and mal-activity diagrams capture threats and abusive behavior of users.

This year, we encourage excellent submissions related, but not restricted, to the following broad headings:
1. Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security
2. Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modeling tools in security
3. Machine learning: modeling and reasoning about the role of big data and machine learning in security operations
4. Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
5. Risk analysis and management: models of risk management in business and organizational architectures
6. Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry.
Preference will be given to papers likely to stimulate high-quality debate at the Workshop.

We solicit two types of submissions:
- Regular papers (up to 18 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work within the scope of the workshop.
- Short papers (up to 10 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work in progress.

The reviewers are not required to read the appendices, so the papers should be intelligible without them. All submissions must be prepared using the LNCS style. Each paper will undergo a thorough review process. Submissions should be made using the GraMSec 2019 EasyChair website:

As in previous editions, post-proceedings will been made available in the Lecture Notes in Computer Science (LNCS) series, published by Springer. This will published after the workshop, thus permitting the authors to incorporate feedback from workshop attendees and reviewers. Authors whose papers are not selected for presentation at the workshop may also be invited to submit a revised version of their manuscript for publication in the post-proceedings.

Early submissions (priority in program, and early notification)
- Early paper submission due: Friday, April 5, 2019
- Notification for early submissions: Friday, May 3, 2019

Late submissions (after CSF notification)
- Late paper submission due: Monday, April 22, 2019
- Notification for late submissions: Monday, May 13, 2019

- Camera ready versions due: Monday, May 27
- Workshop: Monday, June 24. 2019

Massimiliano Albanese, George Mason University, VA, USA
Ross Horne, University of Luxembourg, Luxembourg

Christian W. Probst, Unitec, New Zealand

Sushil Jajodia, George Mason University, USA
Barbara Kordy, INSA Rennes, IRISA, FR
Sjouke Mauw, University of Luxembourg, Luxembourg
Christian W. Probst, Unitec, New Zealand
Ketil St¯len, SINTEF Digital and University of Oslo, Norway

George Cybenko, Dartmouth College

Ludovic Apvrille, Telecom ParisTech, France
Zaruhi Aslanyan, Alexandra Institute, Denmark
Stefano Bistarelli, Universit‡ di Perugia, Italy
Hasan Cam, U.S. Army Research Laboratory, PA, USA
Nora Cuppens-Boulahia, IMT Atlantique, France
Harley Eades III, Augusta University, GA, USA
Olga Gadyatskaya, SnT, University of Luxembourg, Luxembourg
RenÈ Rydhof Hansen, Aalborg University, Denmark
Jin B. Hong, University of Western Australia, Australia
DongSeong Kim, The University of Queensland, New Zealand
Barbara Kordy, INSA Rennes, IRISA, France
Sjouke Mauw, University of Luxembourg, Luxembourg
Per HÂkon Meland, SINTEF ICT, Norway
Guozhu Meng, Chinese Academy of Sciences, Beijing, China
Vivek Nigam, fortiss GmbH, Germany
Andreas Lothe Opdahl, University of Bergen, Norway
Noseong Park, George Mason University, VA, USA
StÈphane Paul, Thales Research and Technology, France
Sophie Pinchinat, INSA Rennes, France
Saöa Radomirovic, University of Dundee, United Kingdom
Rolando Trujillo Ras˙a, Deakin University, Australia
Paul Rowe, The MITRE Corporation, MA, USA
Giedre Sabaliauskaite, Singapore University of Technology and Design, Singapore
Ketil St¯len, SINTEF, Norway
Sridhar Venkatesan, Vencore Labs, VA, USA

Ibifubara Iganibo, George Mason University, VA, USA

Related Resources

Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
CVPR 2022   Computer Vision and Pattern Recognition
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
JCRAI 2021-Ei Compendex & Scopus 2021   2021 International Joint Conference on Robotics and Artificial Intelligence (JCRAI 2021)
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
CFDSP 2022   2022 International Conference on Frontiers of Digital Signal Processing (CFDSP 2022)
AutonomousVehicles 2022   Special Issue - Autonomous Vehicles for Public Transportation Services
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
MLDM 2022   18th International Conference on Machine Learning and Data Mining
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal