what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

AISec2013 Call For Papers

AISec2013 Call For Papers
Posted Jul 23, 2013
Site sites.google.com

The AISec2013 Call For Papers has been announced. It will take place on November 4, 2013 in Berlin, Germany held in conjunction with ACM CCS 2013.

tags | paper, conference
SHA-256 | 53efede4578c200fd9c576434367a341ae6f2db5816ac342f3f7e01796a79fd2

AISec2013 Call For Papers

Change Mirror Download
*** 6th ACM Workshop on Artificial Intelligence and Security ***

https://sites.google.com/site/ccsaisec2013/home
Held in Conjunction with ACM CCS 2013
November 4, 2013 -- Berlin Congress Centre, Berlin, Germany

*** Extended Deadline ***

Paper submissions due: July 29, 2013 (23:59 PDT)
Acceptance notification: August 21, 2013
Camera ready due: August 30, 2013
Workshop: November 4, 2013

*** Call for Papers ***

The potential for applying artificial intelligence (AI), machine
learning, and data mining to security and privacy problems is
ever-more lucrative. The analytic tools and intelligent behavior
provided by these techniques makes AI and learning increasingly
important for autonoumous real-time analysis and decision-making in
domains with a wealth of data or that require quick reactions to
ever-changing situations. Particularly, these intelligent
technologies offer new solutions to security problems involving Big
Data analysis, which can be scaled through cloud-computing. Further,
the use of learning methods in security-sensitive domains creates new
frontiers for security research, in which adversaries may attempt to
mislead or evade intelligent machines. The 2013 ACM Workshop on
Artificial Intelligence and Security (AISec) provides a venue for
presenting and discussing new developments in this fusion of
security/privacy with AI and machine learning.

We invite original research papers describing the use of AI or machine
learning in security, privacy and related problems. We also invite
position and open problem papers discussing the role of AI or machine
learning in security and privacy. Submitted papers of these types may
not substantially overlap papers that have been published previously
or that are simultaneously submitted to a journal or
conference/workshop proceedings. Finally we again welcome a
'systematization of knowledge' category of papers, which should
distill the AI or machine learning contributions of a previously
published series of security papers.

Regular research, systematization of knowledge, and open/position
paper submissions must be at most 10 pages in double-column ACM format
(note: pages must be numbered) excluding the bibliography and
well-marked appendices, and at most 12 pages overall. Committee
members are not required to read the appendices, so the paper should
be intelligible without them. Submissions need not be anonymized. We
recommend the use of the ACM SIG Proceedings templates for
submissions. The ACM format is the required template for the
camera-ready version. Accepted papers will be published by the ACM
Digital Library and/or ACM Press.

Submissions can be made through EasyChair at:
https://www.easychair.org/conferences/?conf=aisec2013

Topics of interest include, but are not limited to:

** Theoretical topics related to security **
* Adversarial Learning
* Robust Statistics
* Online Learning
* Learning in stochastic games

** Security applications **
* Computer Forensics
* Spam detection
* Phishing detection and prevention
* Botnet detection
* Intrusion detection and response
* Malware identification
* Authorship Identification
* Big data analytics for security

** Security-related AI problems **
* Distributed inference and decision making for security
* Secure multiparty computation and cryptographic approaches
* Privacy-preserving data mining
* Adaptive side-channel attacks
* Design and analysis of CAPTCHAs
* AI approaches to trust and reputation
* Vulnerability testing through intelligent probing (e.g. fuzzing)
* Content-driven security policy management & access control
* Techniques and methods for generating training and test sets
* Anomalous behavior detection (e.g. fraud prevention, authentication)

*** Organization ***

General Chair:
Ahmad-Reza Sadeghi, TU Darmstadt; CASED; Fraunhofer SIT; Intel ICRI-SC

Program Co-Chairs:
Blaine Nelson, University of Potsdam
Christos Dimitrakakis, EPFL
Elaine Shi, University of Maryland, College Park

Program Committee
Battista Biggio, University of Cagliari
Ulf Brefeld, Technische Universität Darmstadt
Michael Brückner, SoundCloud Inc.
Mike Burmester, Florida State University
Alvaro A. Cárdenas, University of Texas at Dallas
Mario Frank, University of California, Berkeley
Rachel Greenstadt, Drexel University
Guofei Gu, Texas A&M University
Ling Huang, Intel Labs
Anthony Joseph, University of California, Berkeley
Ari Juels, RSA Labs
Pavel Laskov, University of Tübingen
Daniel Lowd, University of Oregon
Pratyusa Manadhata, HP Labs
Aikaterini Mitrokotsa, HESSO-GE
Roberto Perdisci, University of Georgia
Vasyl Pihur, Google Inc.
Konrad Rieck, University of Göttingen
Fabio Roli, University of Cagliari
Benjamin I. P. Rubinstein, IBM Research
Robin Sommer, ICSI and LBNL
Nina Taft, Technicolor
J. D. Tygar, University of California, Berkeley
Shobha Venkataraman, AT&T Research
Ting-Fang Yen, RSA Labs

--
Prof. Dr. Konrad Rieck
Computer Security Group, University of Göttingen
http://www.sec.cs.uni-goettingen.de





Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close