Penetration Testing mailing list archives

RAID 2003 CFP


From: Joshua Haines <jhaines () ll mit edu>
Date: Mon, 13 Jan 2003 16:55:09 -0500


Researchers,

I am pleased to announce the Sixth International
Symposium on the Recent Advances in Intrusion
Detection (RAID 2003). The Symposium will be held
September 8-10, 2003, in Pittsburgh, Pennsylvania, USA.

For more information, please refer to the CFP included
below, and attached to this email, or go to the
Symposium website: http://www.raid-symposium.org/raid2003.

If you have questions or concerns not addressed by the CFP
or on the website, please contact the Program Chairs:
Giovanni Vigna (vigna () cs ucsb edu) and
Erland Jonsson (jonsson () ce chalmers se) or
the General Chair, John McHugh (jmchugh () cert org).

Thank You, Josh

*---------------------------------------------*
|   Joshua Haines
|   Technical Staff,
|   Information Systems Technology, Group 62,
|   MIT Lincoln Laboratory.
|   Email: jhaines () ll mit edu
|   Phone: 781-981-4337
*---------------------------------------------*



------------

 Call For Papers


                              RAID 2003


                   Sixth International Symposium on
                Recent Advances in Intrusion Detection


                         Pittsburgh, PA, USA
                         September 8-10, 2003
               http://www.raid-symposium.org/raid2003


This symposium, the sixth in an annual series, brings together
leading figures from academia, government, and industry to discuss
state-of-the-art intrusion detection technologies and issues from the
research and commercial perspectives. The RAID International Symposium
series is intended to further advances in intrusion detection by
promoting the exchange of ideas in a broad range of topics.


The RAID 2003 program committee invites two types of submissions:


- Full papers presenting mature research results. Papers accepted
  for presentation at the Symposium will be included in the RAID 2003
  proceedings published by Springer Verlag in its Lecture Notes in
  Computer Science (LNCS) series.


  Full papers are limited to 20 pages when formatted according to the
  instructions provided by Springer Verlag. Papers must include an
  abstract and a list of keywords.


- Panel proposals for presenting and discussing hot topics in the
  field of intrusion detection.


  The panel proposals should include both an outline of the format of
  the panel and a short rationale for the panel. Panels that include
  time for general discussion and questions/answers between the
  panelists and the Symposium attendees are preferred.


The following sorts of topics are within scope:


   - Assessing, measuring, and classifying intrusion-detection systems:
          Quantitative and qualitative assessment of IDSs
          Benchmarking techniques and technologies
          Relations to risk assessment and risk management plans


   - IDS cooperation and integration:
          IDS interoperability standards and standardization
          Combining different types of IDSs
          Integration of IDSs with system/network management frameworks
          Handling of false positives


   - IDSs in high-performance and real-time environments:
          Large-scale/enterprise IDSs
          Intrusion detection for high-speed networks
          Managing high-volume data


   - Vulnerabilities and attacks:
          Vulnerability or attack databases
          Vulnerability or attack taxonomies
          Attack modeling and description languages

   - Innovative Approaches:
          Intrusion tolerance
          Fusion, aggregation, reduction of alerts
          Adaptive intrusion detection solutions
          Survivability and dependability
          Data mining techniques
          Automated response techniques
          Intrusion-detection at the application level
          Intrusion visualization techniques


   - Practical Considerations:
          Case studies
          Unique/emerging IDS operating environments
          Legal issues
          Evidence storage/log requirements, handling, and exchange
          Commercial intrusion detection systems and their directions
          IDS integration with business processes


PROGRAM COMMITTEE


   General Chair:     John McHugh <jmchugh () cert org>


   Program Chairs:    Giovanni Vigna <vigna () cs ucsb edu>
                      Erland Jonsson <jonsson () ce chalmers se>


   Publication Chair: Chris Kruegel <chris () cs ucsb edu>


   Publicity Chair:   Josh Haines <jhaines () ll mit edu>


   Sponsor Chair:     Don McGillen <mcgillen () cmu edu>


   Technical Committee:


   Marc Dacier (Eurecom, France)
   Herve Debar (France Telecom R&D, France)
   Joshua Haines (MIT Lincoln Laboratory, USA)
   Dick Kemmerer (UCSB, USA)
   Calvin Ko (NAI, USA)
   Chris Kruegel (UCSB, USA)
   Wenke Lee (Georgia Tech, USA)
   Ulf Lindqvist (SRI, USA)
   Roy Maxion (CMU, USA)
   Ludovic Me (Supélec, France)
   Vern Paxson (ACIRI/LBNL, USA)
   Phil Porras (SRI, USA)
   Marcus Ranum (Ranum, Inc., USA)
   Rama Sekar (SUNYSB, USA)
   Stuart Staniford (Silicon Defense, USA)
   Kymie Tan (Melbourne University, Australia)
   Al Valdes (SRI, USA)
   Andreas Wespi (IBM Research, Switzerland)
   Felix Wu (UCDavis, USA)
   Diego Zamboni (IBM Research, Switzerland)


IMPORTANT DATES


   Deadline for paper submission                  : March 31, 2003
   Deadline for panel submission                  : April 30, 2003
   Notification of acceptance or rejection        : May 31, 2003
   Final paper camera ready copy due              : June 30, 2003
   RAID dates                                     : September 8-10, 2003


SUBMISSIONS


Submissions must not substantially duplicate work that any of the authors
   has published elsewhere or has submitted in parallel to any other
   conference or workshop with proceedings. The full papers must list all
   authors and their affiliations; in case of multiple authors, the contact
   author must be indicated (note that RAID does not require anonymized
   submissions).


   Authors are invited to submit their papers electronically. A
   detailed description of the electronic submission procedure will be
   made available at http://www.raid-symposium.org/raid2003 by end of
   January 2003. Submissions must conform to this procedure and be
   received within the submission deadline in order to be considered.


   Each submission will be acknowledged by e-mail. If acknowledgment is not
   received within seven days, please contact Giovanni Vigna
   (vigna () cs ucsb edu).


   All submissions must be in English. Plan to give all presentations and
   panels in English.


CORPORATE SPONSORS


   We solicit interested organizations to serve as sponsors for RAID
   2003, particularly in sponsorship of student travel and other
   expenses for RAID. Please contact the Sponsor Chair, Don McGillen
   (mcgillen () cmu edu), for information regarding corporate sponsorship
   of RAID 2003.


REGISTRATION


   Detailed registration information (including fees, suggested hotels, and
   travel directions) will be provided at the RAID 2003 web site
   (http://www.raid-symposium.org/raid2003).


PROCEEDINGS


   Accepted papers will be published by Springer Verlag in its Lecture
   Notes in Computer Science (LNCS) series. Instructions for authors
   are available at http://www.raid-symposium/raid2003.


STEERING COMMITTEE

   Chair: Marc Dacier (Eurecom, France)


   Hervé Debar  (France Telecom R&D, France)
   Deborah Frincke  (University of Idaho, USA)
   Huang Ming-Yuh  (The Boeing Company, USA)
   Wenke Lee  (Georgia Institute of Technology, USA)
   Ludovic Mé  (Supélec, France)
   S. Felix Wu  (UC Davis, USA)
   Andreas Wespi  (IBM Research, Switzerland)
   Giovanni Vigna  (UCSB, USA)


For further information, please contact the Program Chairs or the General
Chair.


Attachment: raid2003_CFP.pdf
Description:

Attachment: raid2003_CFP.ps
Description:

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

Current thread: