what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

RAID 2011 Call For Papers

RAID 2011 Call For Papers
Posted Jan 13, 2011
Site raid2011.org

RAID 2011 Call For Papers - This symposium, the 14th in an annual series, brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. The Recent Advances in Intrusion Detection (RAID) International Symposium series furthers advances in intrusion defense by promoting the exchange of ideas in a broad range of topics. This event will be held from September 20th through the 21st, 2011 in Menlo Park, California.

tags | paper, conference
SHA-256 | 11d8e80349a1478090af5085b6248d7eec84fb5db437073ab6226a0a92acd3f0

RAID 2011 Call For Papers

Change Mirror Download
--------------------------------------------------------------------------

CALL FOR PAPERS

RAID 2011

14th International Symposium on Recent Advances in Intrusion Detection

September 20-21, 2011

SRI International, Menlo Park, CA

http://raid2011.org

--------------------------------------------------------------------------

This symposium, the 14th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry to
discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID) International
Symposium series furthers advances in intrusion defense by promoting the
exchange of ideas in a broad range of topics. As in previous years, all
topics related to intrusion detection, prevention and defense systems and
technologies are within scope, including but not limited to the
following:


* Network and host intrusion detection and prevention
* Anomaly and specification-based approaches
* IDS cooperation and event correlation
* Malware prevention, detection, analysis, containment
* Web application security
* Insider attack detection
* Intrusion response, tolerance, and self-protection
* Operational experiences with current approaches
* Intrusion detection assessment and benchmarking
* Attacks against intrusion detection systems
* Formal models, analysis, and standards
* Deception systems and honeypots
* Vulnerability analysis and forensics
* Adversarial machine learning for security
* Visualization techniques
* High-performance intrusion detection
* Legal, social, and privacy issues
* Network exfiltration detection
* Botnet analysis, detection, and mitigation
* Cyber-physical systems


Important Dates
---------------

Paper submission deadline: Mar 31, 2011 (11:59PM PST)
Paper acceptance or rejection: June 2, 2011
Final camera-ready copy: June 16, 2011
Poster submission: June 18, 2011 (11:59PM PST)
Poster acceptance or rejection: June 25, 2011
Early Bird registration closes August 1, 2011


Types of Submissions
--------------------

* Full papers presenting mature research results or convincing case
studies of protecting large operational networks. Papers accepted
by the Program Committee will be presented at RAID 2011 and
included in the Symposium’s proceedings published by Springer in
its Lecture Notes in Computer Science series. Papers must include
an abstract and a list of keywords, and must not exceed 20 pages in
total length, formatted in LNCS-style and including the
bibliography and any appendices.

* Posters describing a work in progress or an innovative idea not yet
sufficiently mature for a full paper. Posters are submitted for
review in the form of an extended abstract that must likewise be
formatted in LNCS-style and not exceed 2 pages in length. Accepted
posters will be presented at RAID 2011 in a separate session, and
the submitted abstracts will be published on the Symposium’s web
site.

All submissions (papers and poster abstracts) must be formatted
according to the instructions provided by Springer
(http://www.springer.com/comp/lncs/Authors.html) and then submitted
electronically; details will be provided on the conference web site.
Papers must list all authors and their affiliations; RAID does not
require anonymized submissions. For accepted papers, at least one of
the authors must attend the conference to present the paper. Further
questions on the submission process may be sent to the program
chairs. Submissions must not substantially duplicate work that has
already been published elsewhere or is submitted in parallel to a
journal or to any other conference or workshop with proceedings.
Simultaneous submission of the same work to multiple venues,
submission of previously published work, and plagiarism constitute
dishonesty or fraud. RAID, like other scientific and technical
conferences and journals, prohibits these practices and may, on the
recommendation of the program chair, take action against authors who
have committed them.


Student Scholarships
--------------------

RAID 2011 will offer student scholarships to reduce symposium
attendance costs. Students should visit the web site
(http://raid2011.org) to learn about availability of scholarships and
application deadlines.


Organizing Committee
--------------------

General Chair: Alfonso Valdes, SRI International, US
Program Chair: Robin Sommer, ICSI/LBNL, US
Program Co-Chair: Davide Balzarotti, Eurecom, France
Publication Chair: Gregor Maier, ICSI, US
Publicity Chair: Guofei Gu, Texas A&M, US


Program Committee
-----------------

Michael Bailey, University of Michigan, US
Elie Bursztein, Stanford University, US
Juan Caballero, IMDEA Software, Spain
Michael Collins, RedJack, US
Manuel Costa, Microsoft Research, UK
Marco Cova, University of Birmingham, UK
Holger Dreger, Siemens AG, Germany
Debin Gao, Singapore Management University, Singapore
Jonathan Giffin, Georgia Tech, US
Guofei Gu, Texas A&M, US
Guillaume Hiet, Supelec, France
Thorsten Holz, Ruhr-University Bochum, Germany
Sotiris Ioannidis, FORTH, Greece
Jaeyeon Jung, Intel Labs Seattle, US
Syed Ali Khayam, Nat. Univ. of S&T (NUST), Pakistan
Christian Kreibich, ICSI, US
Christopher Kruegel, UC Santa Barbara, US
Corrado Leita, Symantec Research, France
Gregor Maier, ICSI, US
Benjamin Morin, CDISS, France
Phil Porras, SRI International, US
William Robertson, UC Berkeley, US
Anil Somayaji, Carleton University, Canada
Angelos Stavrou, George Mason University, US
Charles Wright, MIT Lincoln Laboratory, US

Steering Committee
-----------------

Chair: Marc Dacier, Eurecom, France

Herve Debar, Telecom SudParis, France
Deborah Frincke, Pacific Northwest National Lab, US
Ming-Yuh Huang, The Boeing Company, US
Somesh Jha, University of Wisconsin, US
Erland Jonsson, Chalmers, Sweden
Engin Kirda, Northeastern University, US
Christopher Kruegel, UC Santa Barbara, US
Wenke Lee, Georgia Tech, US
Ludovic Me, Supelec, France
Alfonso Valdes, SRI International, US
Giovanni Vigna, UC Santa Barbara, US
Andreas Wespi, IBM Research, Switzerland
S. Felix Wu, UC Davis, US
Diego Zamboni, IBM Research, Switzerland
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close