WSCS 2012 - Workshop on Semantic Computing and Security (WSCS)
Topics/Call fo Papers
Semantic Computing technologies derive and use semantics from content, where “content” is wide-ranging: video, audio, text, conversation, software, devices, actions, behavior, etc. Security technology encompasses the specification of secure behavior as well as the detection of insecure behavior over computer networks. The two disciplines come together in this new and interesting combination, in a synergy-seeking, cutting-edge workshop. The delimited notions of semantics used within Security and Privacy provide a well-defined and as yet unstudied domain for semantic modeling, automated semantic interpretation, and inference, with clear practical uses and opportunities for novel and imaginative research.
The workshop on Semantic Computing and Security addresses:
deriving semantics from data used for security and privacy research;
semantic verification of network activity; and
inferring the semantics of malicious free-form data, such as email and web pages.
Topics of interest include but are not limited to:
Network dataset curation through semantic derivation
Semantic MediaWiki for vulnerability sharing and detecting emergent security properties
Network security semantics, dynamic classification
Inferred semantics of malicious code
Semantic verification of network operations
Semantic specification and analysis of security experiment design
Semantic analysis of access control policies
Semantics of data acquisition and computation provenance
Semantic analysis of malware communication
Semantics-aware trust management
The workshop on Semantic Computing and Security addresses:
deriving semantics from data used for security and privacy research;
semantic verification of network activity; and
inferring the semantics of malicious free-form data, such as email and web pages.
Topics of interest include but are not limited to:
Network dataset curation through semantic derivation
Semantic MediaWiki for vulnerability sharing and detecting emergent security properties
Network security semantics, dynamic classification
Inferred semantics of malicious code
Semantic verification of network operations
Semantic specification and analysis of security experiment design
Semantic analysis of access control policies
Semantics of data acquisition and computation provenance
Semantic analysis of malware communication
Semantics-aware trust management
Other CFPs
- 5th International Conference ICT for Language Learning
- 6th Panhellenic Conference on Acoustics 2012
- Eigth Latin American Workshop on Logic / Languages, Algorithms and New Methods of Reasoning 2012
- 2012 International Conference on Advance in Soft Computing (ICASC 2012)
- Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction (AKBC-WEKEX 2012)
Last modified: 2012-02-09 18:33:09