Intrusion Detection Systems mailing list archives

[Mod FWD] Call for Papers -- Intrusion Detection Workshop


From: justin.lister () csfb com (Lister, Justin)
Date: Tue, 4 Apr 2000 09:56:06 +0800


Archive: http://msgs.securepoint.com/ids
FAQ: http://www.ticm.com/kb/faq/idsfaq.html
IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au
____________________________________________________________________________
____
Message-ID: <030701bf9da7$d7eb8920$34366581 () cs uidaho edu>
From: "Jim Alves-Foss" <jimaf () cs uidaho edu>
To: <ids () uow edu au>
Subject: Call for Papers -- Intrusion Detection Workshop
Date: Mon, 3 Apr 2000 15:04:38 -0500
Organization: University of Idaho

My apologies if you receive multiple copies of this.
The following is a call for papers for the CCS Intrusion detection workshop.
A copy of the call can be found at:  www.csds.uidaho.edu/ccs2000.html
-Jim Alves-Foss, Co-Director
 Center for Secure and Dependable Software
 University of Idaho
 Moscow, ID
 jimaf () cs uidaho edu

FIRST
Call For Papers
Workshop on Intrusion Detection and Prevention
Held as part of the

7th ACM Conference on Computer Security (CCS 2000)

http://www.ccs2000.org/

Athens, Greece

November 1, 2000

(CCS 2000 dates: Nov 1-4, 2000)

This year the ACM's Conference on Computer Communications and Security
offers a special session on Intrusion Detection and Prevention. This event
provides an opportunity for attendees of the ACM CCS to meet with
researchers in the areas of intrusion detection and prevention to discuss
critical issues of mutual interest during a concentrated period.

Areas of Interest
Papers offering novel research contributions in any aspect of intrusion
detection and prevention likely to be of interest to ACM CCS attendees are
solicited for submission to the workshop. Papers may present theory,
technique, applications, or practical experiences. We are especially
interested in the following topics:

  a.. Detection and/or prevention techniques and/or issues for
nontraditional systems
  b.. Evaluation/assessment and emerging standards for detection and
prevention
  c.. Commercial/deployment issues
  d.. Case studies suitable for classroom presentation
  e.. Integrated/systemic approaches to intrusion/misuse management:
detection, analysis, prevention, and response
For this session on intrusion detection and prevention, we are particularly
interested in papers which emphasize less traditional environments, such as
networked embedded systems rather than the typical corporate network.
However, papers on all relevant topics will be considered. Due to the
limited number of papers which can be presented during this half-day
session, we are requesting that abstract be sent to the program committee in
advance (see below) to determine likely suitability for presentation.

Workshop Organization
Workshop Chair:

  Deborah Frincke (University of Idaho, Minotaur Research)
Program committee:

  Rebecca Bace (Infidel)
  Tim Grance (National Institute of Standards and Technology, USA)
  Ming-Yuh Huang (Boeing Applied Research and Technology, USA)
  Phil Porras (SRI International)
  Richard Lippmann (MIT Lincoln Laboratory)
  Eugene Spafford (CERIAS - Purdue University)
Publicity and Review Organizing Committee:

  Jim Alves-Foss (University of Idaho)
  Tom Karygiannis (National Institute of Standards and Technology, USA)
  Peter Mell (National Institute of Standards and Technology, USA)
SUBMISSIONS
Papers which fall into the topic areas outlined above are particularly
welcome, although contributions outside those topics may also be of interest
(please contact the workshop chair if you have questions).

We are requiring submission of an abstract (no more than 250 words, plain
ASCII text) prior to submission of a full paper. This abstract will be used
to better identify appropriate reviewers and to provide potential authors
with feedback as to the likely suitability of their chosen topic. Short
feedback as to the likely appropriateness of a paper following the outline
provided in the abstract should be received within one or two weeks of the
abstract's submission. Abstracts should include the name of the authors,
phone number/email/fax/address information for one author (identified as the
"correspondence author"), as well as the abstract itself, and should be sent
to ccides () csds uidaho edu .

When the full paper is submitted, it must be sent electronically to the
address below, in an email which includes the following three files:

1. A separate title page in ASCII text with:

  a.. The title or topic
  b.. The name(s) of the authors, organizational affiliation(s), telephone
and FAX numbers, postal address, and Internet electronic mail address for
the contact author. The likely speaker should also be identified and must be
registered for ACM CCS by the deadline below in advance in order to assist
us in producing our program. Participation of one author is a required
condition of acceptance.
  c.. The author to contact for correspondence about the paper
  d.. A short (less than 250 word) abstract
2. The paper itself in PDF

  a.. Up to twenty pages (12 point font); we anticipate most will be in the
12-15 page range
  b.. A brief biography of each author as appropriate (as a separate section
at the end of the paper)
3. A release form (this will be emailed to authors who submit abstracts)

Submitted papers must not have been previously published, or currently under
consideration for publication elsewhere, or have substantial overlap with
papers the author has submitted elsewhere. Accepted papers will be published
in a proceedings (more information will be available later).

Submissions should be sent to ccsids () csds uidaho edu. The subject line must
have the following format:

[CCSIDS] ContactAuthor Title

Each submission will be acknowledged by e-mail. If acknowledgment is not
received within seven days, please contact the program chair. Questions
about ACM CCS should not be sent to the submission address; instead, please
contact the CCS program committee as indicated below.

BEST PAPER COMPETITION

The best paper of the workshop will be selected by the reviewers, and
announced at CCS 2000.

PROCEEDINGS

In addition to publication on the web, it is anticipated that all papers
will be published in a proceedings after the colloquium. Details of this
process are being investigated; information will be supplied to authors
submitting papers and also provided on the CCS web site as soon as it is
available.

CORPORATE SPONSORS
We solicit interested organizations to become sponsors, particularly in
terms of reimbursing student travel and other expenses. Please contact
Deborah Frincke at frincke () cs uidaho edu for information regarding
sponsorship of the IDS workshop (those interested in sponsoring CCS as a
whole should contact the CCS program committee). If we are able to provide
student travel assistance through the help of our sponsors, this information
will be made available to accepted authors in June.

IMPORTANT DATES
      Deadline for abstract submission (confirmation of acceptability
provided in one week) May 1, 2000

      Deadline for paper submission  June 7, 2000

      Notification to Accepted Authors   July 7, 2000

      Camera-Ready Copy August 7, 2000

      Registration Deadline for Accepted Authors * August 7 , 2000

      .Workshop and CCS dates  Nov 1-4, 2000

 *since this is a workshop, at least one author must commit to attend
CCS/IDS workshop for each accepted paper by the deadline above.

FOR MORE INFORMATION
  a.. Sponsorship of IDS workshop: contact Deborah Frincke,
frincke () cs uidaho edu
  b.. Information about the ACM CCS in general is available through the ACM
CCS Web site: http://www.ccs2000.org/
____________________________________________________________________________
____

This message is for the named person's use only.  It may contain 
confidential, proprietary or legally privileged information.  No 
confidentiality or privilege is waived or lost by any mistransmission.
If you receive this message in error, please immediately delete it and all
copies of it from your system, destroy any hard copies of it and notify the
sender.  You must not, directly or indirectly, use, disclose, distribute, 
print, or copy any part of this message if you are not the intended 
recipient. CREDIT SUISSE GROUP and each of its subsidiaries each reserve
the right to monitor all e-mail communications through its networks.  Any
views expressed in this message are those of the individual sender, except
where the message states otherwise and the sender is authorised to state 
them to be the views of any such entity.


Current thread: