Forwarded from: Yacine Zemali <yacine.zemali (at) ensi-bourges.fr> [Apologies if you receive multiple copies. Please distribute this call to interested parties.] --------------------------------------------------------------------------- CALL FOR PAPERS 3rd Workshop on Intelligent Security Security and Artificial Intelligence (SecArt-11) http://www.tzi.de/~edelkamp/intelligentsecurity/ --------------------------------------------------------------------------- As part of the 22nd International Joint Conference on Artificial Intelligence - IJCAI-11 (http://ijcai-11.iiia.csic.es/). July 18, 2011 Barcelona, Spain AIM AND SCOPE ------------- Our increasingly networked world continues to provide new opportunities for security breaches that have severe consequences at the personal level (identity theft, and resulting financial losses), for businesses (theft of intellectual property, or business plans, or costly responses to the theft of customer data), and for governments. Computing and the internet have become crucial parts of the infrastructure of almost every significant commercial or governmental enterprise. Turning off the computers or disconnecting from the network has become tantamount to turning off the power. The use of techniques drawn from AI is increasingly relevant as the scale of the problem increases, in terms of the size and complexity of the networks being protected, the variety of applications and services provided using that infrastructure, and the sophistication of the attacks being made. With this workshop, we hope to encourage dialogue and collaboration between the AI and Security communities. Further, we hope that this will foster a continuing interaction. Previous workshops in this area include the ICAPS-09 and AAAI-10 workshops on Intelligent Security, as well as three workshops held in conjunction with the ACM Conference on Computer and Communications Security (CCS), in 2008, 2009, and 2010. Topics of interest for this workshop include, but are not limited to, the following: * Knowledge Representation and Engineering for Cyber Security * Secure Web Services * Development of Trusted Software * Data Mining and Forensics * Data Mining Malware * Automated Vulnerability Analysis * Automated Exploit and Attack Generation * Automated Alerting and Response * Diagnosis and Plan Recognition * Automating Security Analyses and Audits * Artificial Immune Systems * Privacy and Confidentiality * Intelligent User Interfaces for Security Applications * Security and Organizational Structure The emphasis for this one-day workshop will be on discussion and interaction among the workshop participants, grounded in and motivated by a limited number of presentations drawn from full paper submissions, as well as an invited speaker. PAPER SUBMISSIONS ----------------- Please use the following EasyChair link for submitting your paper: http://www.easychair.org/conferences/?conf=secart11 We will accept either full papers for presentation or position papers outlining the author's background, interests, and suggested topics for or contributions to the workshop. All submissions should be preferably in PDF format according to AAAI's style. For *submissions* of full papers the max. length is 8, while for *publication* of accepted papers, it will be between 6 and 8, depending on the number of papers accepted. The max. length of position/short papers is 2 pages. IMPORTANT DATES --------------- * Deadline for submissions: April 4, 2011 * Notification: May 9, 2011 * Camera-ready paper due: May 23, 2011 * Workshop: July 18, 2011 PROGRAM COMMITTEE ----------------- * Bob Balzer (Teknowledge, US) * Chris Geib (University of Edinburgh, GB) * Robert P. Goldman (SIFT, US) * Alessio Lomuscio (Imperial College London, GB) * Norbert Pohlmann (Internet-Sicherheit, Germany) * Anil Somayaji (Carleton University, CA) * Tim Strayer (BBN Technologies, US) * Dan Thomsen (SIFT, US) * Frederic Cuppens (Telecom Bretagne, France) * Joerg Hoffmann (INRIA Nancy, France) * Thorsten Holz (Ruhr-University Bochum, Germany) * Rachel Greenstadt (Drexel University, US) * Karsten Sohr (University of Bremen, Germany) WORKSHOP CHAIRS --------------- Mark Boddy Adventium Labs 111 Third Avenue South, Suite 100 Minneapolis, MN 55401, USA Email: mark.boddy (at) adventiumlabs.org Stefan Edelkamp Technologie-Zentrum Informatik Am Fallturm 1, Raum 2.62 28357 Universität Bremen, Germany Email: edelkamp (at) tzi.de Yacine Zemali ENSI de Bourges LIFO - EA 4022 88 Boulevard Lahitolle 18020 Bourges Cedex, France Email: yacine.zemali (at) ensi-bourges.fr ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/Received on Mon Feb 14 2011 - 22:46:02 PST
This archive was generated by hypermail 2.2.0 : Mon Feb 14 2011 - 23:02:45 PST