Our Sponsors
Website www.sigsac.org/ccs/CCS2011 |
Edit Freely
Category AISEC 2011
Deadline: July 06, 2011 | Date: October 21, 2011
Venue/Country: Chicago, U.S.A
Updated: 2011-04-29 12:03:35 (GMT+9)
Call for Papers1.OverviewThe ubiquitous nature of information and communication today is often cited as the cause of many security and privacy problems including identity and reputation management, viruses/worms and phishing/pharming. There is strong evidence, however, that this abundance of information and communication has at least as many security and privacy benefits as costs.Consider for example, the use of machine learning algorithms to detect network intrusions, crowd-based approaches to anonymous communication and the use of data mining algorithms to determine content sanitization. All of these efforts benefit from recent advances in AI, which have often been driven by increases in the amount of available data.To fully realize the security and privacy benefits of today's ubiquitous information, the security community needs expertise in the tools and techniques for managing that information, namely, artificial intelligence technology, and the AI community needs an understanding of security and privacy problems. To facilitate an exchange of ideas between these two communities, we are holding the fourth workshop in "AISec" in conjunction with the ACM Conference on Computer and Communications Security (CCS), on the new field of security and privacy solutions that leverage AI technologies. Our full-day workshop will be a mix of technical papers and position papers with ideas for AISec's future.2.TopicsWe invite original research papers describing the use of AI or Machine Learning in security and privacy problems. We also invite position papers discussing the role of AI or Machine Learning in security and privacy. Submitted papers may not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference with proceedings.Research submissions should be at most 8 pages excluding the bibliography and well-marked appendices using double-column, and reasonable margins on letter-size paper, and at most 10 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. Position papers should be at most 4 pages long in total using the same guidelines as above. Submissions need not be anonymized. We recommend the use of the ACM SIG Proceedings templates for submission.Submissions can be made through EasyChair following this linkTopics of interest include, but are not limited to:* Adversarial Learning* Robust Statistics* Online Learning* Spam detection* Botnet detection* Intrusion detection* Malware identification* Privacy-preserving data mining* Design and analysis of CAPTCHAs* Phishing detection and prevention* AI approaches to trust and reputation* Vulnerability testing through intelligent probing (e.g. fuzzing)* Content-driven security policy management & access control* Techniques and methods for generating training and test sets* Anomalous behavior detection (e.g. for the purposes of fraud prevention, authentication) 3.Tentative Schedule Submissions due: July 6, 2011 (23:59 PDT)Acceptance notification: August 4, 2011Final manuscript due: August 19, 2011 Workshop date: October 21, 20114.Submission GuidelinesSubmissions can be made by the deadline of July 6, 2011, through the website: https://www.easychair.org/conferences/?conf=aisec2011
Research submissions should be at most 8 pages excluding thebibliography and well-marked appendices using double-column, andreasonable margins on letter-size paper, and at most 10 pages total.Committee members are not required to read the appendices, so the paper should be intelligible without them. Position papers should be at most 4 pages long in total using the same guidelines as above. Submissions need not be anonymized. We recommend the use of the ACM SIG Proceedings templates for submission.5.OrganizationGeneral Chair* Yan Chen (Northwestern University)Program Co-Chairs* Alvaro A. Cardenas (Fujitsu Laboratories of America)* Rachel Greenstadt (Drexel University)* Ben Rubinstein (Microsoft Research)Program Committee* Dirk Balfanz (Google)* Christos Dimitrakakis (Frankfurt Institute for Advanced Studies)* Giorgio Giacinto (University of Cagliari)* Guofei Gu (Texas A&M University)* Justin Ma (UC Berkeley)* Blaine Nelson (University of Tubingen)* Roberto Perdisci (University of Georgia)* Konrad Rieck (TU Berlin)* Fabio Roli (University of Cagliari)* Elaine Shi (PARC and UC Berkeley)* Robin Sommer (ICSI and LBNL)* Jessica Staddon (Google)Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.