Call for Papers: RAID'11 Jan 13 2011 10:01PM
Guofei Gu (guofei cse tamu edu)
Dear colleagues,

please find below the Call for Papers for RAID'11 (

Apologies for multiple copies of this announcement.

Best regards,
Guofei Gu
Assistant Professor
Department of Computer Science & Engineering
Texas A&M University



RAID 2011

14th International Symposium on Recent Advances in Intrusion Detection

September 20-21, 2011

SRI International, Menlo Park, CA


This symposium, the 14th in an annual series, brings together leading
researchers and practitioners from academia, government, and industry to
discuss issues and technologies related to intrusion detection and
defense. The Recent Advances in Intrusion Detection (RAID) International
Symposium series furthers advances in intrusion defense by promoting the
exchange of ideas in a broad range of topics. As in previous years, all
topics related to intrusion detection, prevention and defense systems and
technologies are within scope, including but not limited to the

* Network and host intrusion detection and prevention
* Anomaly and specification-based approaches
* IDS cooperation and event correlation
* Malware prevention, detection, analysis, containment
* Web application security
* Insider attack detection
* Intrusion response, tolerance, and self-protection
* Operational experiences with current approaches
* Intrusion detection assessment and benchmarking
* Attacks against intrusion detection systems
* Formal models, analysis, and standards
* Deception systems and honeypots
* Vulnerability analysis and forensics
* Adversarial machine learning for security
* Visualization techniques
* High-performance intrusion detection
* Legal, social, and privacy issues
* Network exfiltration detection
* Botnet analysis, detection, and mitigation
* Cyber-physical systems

Important Dates

Paper submission deadline: Mar 31, 2011 (11:59PM PST)
Paper acceptance or rejection: June 2, 2011
Final camera-ready copy: June 16, 2011
Poster submission: June 18, 2011 (11:59PM PST)
Poster acceptance or rejection: June 25, 2011
Early Bird registration closes August 1, 2011

Types of Submissions

* Full papers presenting mature research results or convincing case
studies of protecting large operational networks. Papers accepted
by the Program Committee will be presented at RAID 2011 and
included in the Symposiumâ??s proceedings published by Springer in
its Lecture Notes in Computer Science series. Papers must include
an abstract and a list of keywords, and must not exceed 20 pages in
total length, formatted in LNCS-style and including the
bibliography and any appendices.

* Posters describing a work in progress or an innovative idea not yet
sufficiently mature for a full paper. Posters are submitted for
review in the form of an extended abstract that must likewise be
formatted in LNCS-style and not exceed 2 pages in length. Accepted
posters will be presented at RAID 2011 in a separate session, and
the submitted abstracts will be published on the Symposiumâ??s web

All submissions (papers and poster abstracts) must be formatted
according to the instructions provided by Springer
( and then submitted
electronically; details will be provided on the conference web site.
Papers must list all authors and their affiliations; RAID does not
require anonymized submissions. For accepted papers, at least one of
the authors must attend the conference to present the paper. Further
questions on the submission process may be sent to the program
chairs. Submissions must not substantially duplicate work that has
already been published elsewhere or is submitted in parallel to a
journal or to any other conference or workshop with proceedings.
Simultaneous submission of the same work to multiple venues,
submission of previously published work, and plagiarism constitute
dishonesty or fraud. RAID, like other scientific and technical
conferences and journals, prohibits these practices and may, on the
recommendation of the program chair, take action against authors who
have committed them.

Student Scholarships

RAID 2011 will offer student scholarships to reduce symposium
attendance costs. Students should visit the web site
( to learn about availability of scholarships and
application deadlines.

Organizing Committee

General Chair: Alfonso Valdes, SRI International, US
Program Chair: Robin Sommer, ICSI/LBNL, US
Program Co-Chair: Davide Balzarotti, Eurecom, France
Publication Chair: Gregor Maier, ICSI, US
Publicity Chair: Guofei Gu, Texas A&M, US

Program Committee

Michael Bailey, University of Michigan, US
Elie Bursztein, Stanford University, US
Juan Caballero, IMDEA Software, Spain
Michael Collins, RedJack, US
Manuel Costa, Microsoft Research, UK
Marco Cova, University of Birmingham, UK
Holger Dreger, Siemens AG, Germany
Debin Gao, Singapore Management University, Singapore
Jonathan Giffin, Georgia Tech, US
Guofei Gu, Texas A&M, US
Guillaume Hiet, Supelec, France
Thorsten Holz, Ruhr-University Bochum, Germany
Sotiris Ioannidis, FORTH, Greece
Jaeyeon Jung, Intel Labs Seattle, US
Syed Ali Khayam, Nat. Univ. of S&T (NUST), Pakistan
Christian Kreibich, ICSI, US
Christopher Kruegel, UC Santa Barbara, US
Corrado Leita, Symantec Research, France
Gregor Maier, ICSI, US
Benjamin Morin, CDISS, France
Phil Porras, SRI International, US
William Robertson, UC Berkeley, US
Anil Somayaji, Carleton University, Canada
Angelos Stavrou, George Mason University, US
Charles Wright, MIT Lincoln Laboratory, US

Steering Committee

Chair: Marc Dacier, Eurecom, France

Herve Debar, Telecom SudParis, France
Deborah Frincke, Pacific Northwest National Lab, US
Ming-Yuh Huang, The Boeing Company, US
Somesh Jha, University of Wisconsin, US
Erland Jonsson, Chalmers, Sweden
Engin Kirda, Northeastern University, US
Christopher Kruegel, UC Santa Barbara, US
Wenke Lee, Georgia Tech, US
Ludovic Me, Supelec, France
Alfonso Valdes, SRI International, US
Giovanni Vigna, UC Santa Barbara, US
Andreas Wespi, IBM Research, Switzerland
S. Felix Wu, UC Davis, US
Diego Zamboni, IBM Research, Switzerland

Certify Software Integrity - thawte Code Signing Certificates
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.;5000;25;1371;0;2;946;005be7f5c8

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus