Call-for-Paper Submission Guideline
Last Modified:4/18/05
The Cipher calendar and CFP list are primarily for researchers in
the field of computer and network security to present original work.
Other conferences may be included at the discretion of the editor.
To have a conference considered for inclusion in the Cipher calendar
and Calls-for-Papers, please submit a text version of the CFP to
cipher-cfp@ieee-security.org. Your email message should contain the
name of the conference/workshop, the exact date it is being held and
submission deadline including the year, place, a concise text version
of the call-for-papers, and a URL for conference/workshop website.
A URL, instead of ASCII text, is acceptable if the page has all the essential
information available as ASCII text that can be "selected" using
a window system interface. If the date or place or other information
is in an embedded graphic, it may delay processing of the CFP indefinitely.
A third option, for HTML experts, is to submit HTML for a calendar and CFP entry
in the exact HTML format used in compiled listings; use "view source"
in a browser to see the format of calendar and CFP pages. Use this option
only if you have extensive experience editing HTML source files.
Note:Please submit your call for papers as early as possible to permit timely
inclusion into the list.
In case that you have difficulty in submitting your CFP, please
contact Sven Dietrich or Yong Guan at:
Dr. Sven Dietrich,
Stevens Institute of Technology, Department of Computer
Science, Hoboken, NJ 07030. Phone: +1-201-216-8078.
Dr. Yong Guan,
Department of Electrical and Computer Engineering, Iowa State
University, Ames, IA 50011. Phone: (515) 294-8378.
The following is an example of Call-for-papers:
RAID 2005 Eighth
International Symposium on Recent Advances in Intrusion Detection,
Seattle, Washington, USA, September 7-9, 2005. (Submissions due 31
March 2005) [posted here 12/13/04]
This symposium, the eighth in an annual series, brings together
leading researchers and practitioners from academia, government, and
industry to discuss intrusion detection
technologies and issues from the research and commercial
perspectives. The RAID International Symposium series is intended to
further advances in intrusion defense by promoting the
exchange of ideas in a broad range of topics.
For RAID 2005 we are expanding our historical scope from a focus on
intrusion detection to the broader field of intrusion defense. Of
particular interest are intrusion tolerant systems and
systems for which detection triggers an adaptive response. As in
2004, we welcome papers that address issues related to intrusion
defense, including information gathering and monitoring,
as a part of a larger, not necessarily purely technical,
perspective. We also invite papers on the following topics, as they
bear on intrusion detection and the general problem of
information security:
- Risk assessment and risk management
- Intrusion tolerance
- Deception systems and honeypots
- Vulnerability Analysis and Management
- IDS Assessment
- IDS Survivability
- Privacy aspects
- Data mining techniques
- Visualization techniques
- Cognitive approaches
- Biological approaches
- Self-learning
- Case studies
- Legal issues
- Critical infrastructure protection (CIP)
For more information, please see
http://www.raid-symposium.org/.
|