ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

RAID 2018 - 21st International Symposium on Research in Attacks, Intrusions, and Defenses

Date2018-09-10 - 2018-09-12

Deadline2018-03-27

VenueHeraklion, Crete, Greece Greece

Keywords

Websitehttps://www.raid2018.org

Topics/Call fo Papers

The 21th International Symposium on Research in Attacks, Intrusions, and
Defenses (RAID 2018), previously known as Recent Advances in Intrusion
Detection, aims at bringing together leading researchers and practitioners
from academia, government, and industry to discuss novel research
contributions related to computer and information security. RAID 2018 will
be held in Heraklion, Crete, Greece on 10-12 September 2018
Since its inception in 1997, RAID has established itself as a venue where
leading researchers and practitioners are given the opportunity to present
novel research in a unique venue to an engaged and lively community.
Attendees are from prestigious universities, government, and high technology
companies all over the world.
Attendees typically include:
- Researchers working in the field of computer and information security
- Academics studying the field of cyber security
- Incident response and security teams with responsibility for coordinating
computer security
- Technical staff who determine security product needs and implement solutions
- Anyone wanting to learn more about computer security in general
Types of Submissions Solicited
---
The RAID conference is known for the quality and thoroughness of the reviews
of the papers submitted, the desire to build a bridge between research
carried out in different communities, and the emphasis given on the need for
sound experimental methods and measurement to improve the state of the art
in cybersecurity.
This year, RAID 2018 is soliciting research papers on topics covering all
well-motivated security problems. We care about techniques that identify new
real-world threats, techniques to prevent them, to detect them, to mitigate
them, or to assess their prevalence and their consequences. Measurement
papers are encouraged, as well as papers offering public access to new tools
or datasets, or experience papers that clearly articulate important lessons.
Specific topics of interest to RAID include:
- Computer, network, and cloud computing security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile Security
- Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Hardware security
- Cyber physical systems security and threats against critical infrastructures
- Internet-of-Things security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- Denial-of-Service attacks
- Security measurement studies
- Digital forensics
Papers will be judged on novelty, significance, correctness, and clarity. We
expect all papers to provide enough detail to enable reproducibility of
their experimental results.
Submission Guidelines
---
Each paper must include an abstract and a list of keywords, and must not
exceed 20 pages in total length, formatted in LNCS-style and including the
bibliography and any appendices.
Reviewing will be double-blind, meaning the authors’ identities will be
hidden from the reviewers. All papers must be appropriately anonymized:
author names or affiliations must not appear in the submission, you must
refer to your own prior work in the third person, you should not give the
paper a title that corresponds to a publicly available technical report, and
should anonymize the bibliographic section in an appropriate manner, etc.
Papers that are not anonymized will not be reviewed.
Submissions must not substantially duplicate work that has already been
published elsewhere or submitted in parallel to a journal or to any other
conference or workshop with proceedings. Simultaneous submission of the same
work to multiple venues, submission of previously published work, and
plagiarism constitute dishonesty or fraud. RAID, like other scientific and
technical conferences and journals, prohibits these practices and may, on
the recommendation of the program chair, take action against authors who
have committed them. RAID abides with policies for plagiarism, submission
confidentiality, reviewer anonymity, and prior and concurrent paper
submission that mirror those of the ACM (see
http://www.acm.org/publications/policies/).
Papers accepted by the Program Committee will be presented at RAID 2018 and
included in the Symposium’s proceedings published by Springer in its Lecture
Notes in Computer Science series.
Authors who are unsure whether their submissions might meet these
guidelines, or who have specific questions about the guidelines, are welcome
to contact the program committee co-chairs.
Organization
---
General Chair
- Sotiris Ioannidis, Foundation for Research and Technology - Hellas
Program Committee Chair
- Michael Bailey, University of Illinois at Urbana Champaign
Program Committee Co-Chair
- Thorsten Holz, Ruhr-Universität Bochum
Publication Chair
- Manolis Stamatogiannakis, Vrije Universiteit Amsterdam
Publicity Chair
- Michalis Polychronakis, Stony Brook University
Local Arrangement Chair
- Ioannis Askoxylakis, Foundation for Research and Technology - Hellas
Program Committee
- Sadia Afroz, University of California at Berkeley
- Magnus Almgren, Chalmers University of Technology
- Johanna Amann, International Computer Science Institute
- Leyla Bilge, Symantec
- Srdjan Capkun, ETH Zurich
- Lorenzo Cavallaro, Royal Holloway, University of London
- Lucas Davi, University Duisburg-Essen
- Tudor Dumitras, University of Maryland
- Zakir Durumeric, Stanford University and Zcorp
- Manuel Egele, Boston University
- Roya Ensafi, University of Michigan
- Giulia Fanti, Carniegie Mellon University
- Carrie Gates, Securelytix
- Jon Giffin, Google, Inc.
- Guofei Gu, Texas A&M University
- Amin Kharraz, University of Illinois at Urbana-Champaign
- Tim Leek, MIT Lincoln Laboratory
- Bo Li, University of Illinois at Urbana-Champaign
- Sarah Meiklejohn, University College London
- Fabian Monrose, University of North Carolina at Chapel Hill and ZeroPoint
Dynamics, LLC
- Benjamin Morin, French Network and Information Security Agency (ANSSI)
- Alina Oprea, Northeastern University
- Jason Polakis, University of Illinois at Chicago
- Christina Pöpper, New York University
- William Robertson, Northeastern University
- Brendan Saltaformaggio, Georgia Institute of Technology
- Angelos Stavrou, George Mason University
- Kurt Thomas, Google, Inc.
- Eric Wustrow, University of Colorado Boulder
- Dongyun Xu, Purdue University
Steering Committee
- Johanna Amann, International Computer Science Institute
- Davide Balzarotti, Eurecom Graduate School and Research Center
- Marc Dacier, Eurecom Graduate School and Research Center
- Zhiqiang Lin, University of Texas at Dallas
- Mathias Payer, Purdue University
- Michalis Polychronakis, Stony Brook University
- Salvatore Stolfo, Columbia University
- Angelos Stavrou, George Mason University

Last modified: 2018-01-19 21:41:52