RAID 2015 - 18th International Symposium on Research in Attacks, Intrusions and Defenses
Date2015-11-02 - 2015-11-04
Deadline2015-05-29
VenueKyoto, Japan
Keywords
Websitehttps://www.raid2015.org
Topics/Call fo Papers
18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015) aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to any area of computer and information security.
Papers on all topics related to intrusion detection and prevention are within scope, including papers on:
Malware and botnet analysis, detection, and mitigation
Smartphone and other embedded systems security
Network & active defenses
Web application security
New attacks against computers and networks
Denial-of-Service Attacks
Insider attack detection
Formal models, analysis, and standards
Deception systems and honeypots
Vulnerability analysis
Secure software development
Machine learning for security
Computer security visualization techniques
Network exfiltration
Online money laundering and underground economy
Hardware vulnerabilities
Binary analysis and reverse engineering
Digital forensics
Security and Privacy
Intrusion detection and prevention
Papers will be judged on novelty, significance, correctness, and clarity. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt and papers that refute prior published results.
Papers on all topics related to intrusion detection and prevention are within scope, including papers on:
Malware and botnet analysis, detection, and mitigation
Smartphone and other embedded systems security
Network & active defenses
Web application security
New attacks against computers and networks
Denial-of-Service Attacks
Insider attack detection
Formal models, analysis, and standards
Deception systems and honeypots
Vulnerability analysis
Secure software development
Machine learning for security
Computer security visualization techniques
Network exfiltration
Online money laundering and underground economy
Hardware vulnerabilities
Binary analysis and reverse engineering
Digital forensics
Security and Privacy
Intrusion detection and prevention
Papers will be judged on novelty, significance, correctness, and clarity. We encourage papers that bridge research in different communities. We also welcome experience papers that clearly articulate lessons learnt and papers that refute prior published results.
Other CFPs
- 24th International Conference on Systems Engineering 2015
- Second International Conference on Science, Technology, Engineering and Management 2015 (ICSTEM 2015)
- 20th International Doctoral Symposium on Components and Architecture
- Workshop on Automotive Software Architectures
- 2015 2nd International Conference on Sensors, Instrument and Information Technology (ICSIIT 2015)
Last modified: 2015-02-04 22:17:50