Intrusion Detection Systems mailing list archives
[Mod FWD] Call for Papers -- Intrusion Detection Workshop
From: justin.lister () csfb com (Lister, Justin)
Date: Tue, 4 Apr 2000 09:56:06 +0800
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au ____________________________________________________________________________ ____ Message-ID: <030701bf9da7$d7eb8920$34366581 () cs uidaho edu> From: "Jim Alves-Foss" <jimaf () cs uidaho edu> To: <ids () uow edu au> Subject: Call for Papers -- Intrusion Detection Workshop Date: Mon, 3 Apr 2000 15:04:38 -0500 Organization: University of Idaho My apologies if you receive multiple copies of this. The following is a call for papers for the CCS Intrusion detection workshop. A copy of the call can be found at: www.csds.uidaho.edu/ccs2000.html -Jim Alves-Foss, Co-Director Center for Secure and Dependable Software University of Idaho Moscow, ID jimaf () cs uidaho edu FIRST Call For Papers Workshop on Intrusion Detection and Prevention Held as part of the 7th ACM Conference on Computer Security (CCS 2000) http://www.ccs2000.org/ Athens, Greece November 1, 2000 (CCS 2000 dates: Nov 1-4, 2000) This year the ACM's Conference on Computer Communications and Security offers a special session on Intrusion Detection and Prevention. This event provides an opportunity for attendees of the ACM CCS to meet with researchers in the areas of intrusion detection and prevention to discuss critical issues of mutual interest during a concentrated period. Areas of Interest Papers offering novel research contributions in any aspect of intrusion detection and prevention likely to be of interest to ACM CCS attendees are solicited for submission to the workshop. Papers may present theory, technique, applications, or practical experiences. We are especially interested in the following topics: a.. Detection and/or prevention techniques and/or issues for nontraditional systems b.. Evaluation/assessment and emerging standards for detection and prevention c.. Commercial/deployment issues d.. Case studies suitable for classroom presentation e.. Integrated/systemic approaches to intrusion/misuse management: detection, analysis, prevention, and response For this session on intrusion detection and prevention, we are particularly interested in papers which emphasize less traditional environments, such as networked embedded systems rather than the typical corporate network. However, papers on all relevant topics will be considered. Due to the limited number of papers which can be presented during this half-day session, we are requesting that abstract be sent to the program committee in advance (see below) to determine likely suitability for presentation. Workshop Organization Workshop Chair: Deborah Frincke (University of Idaho, Minotaur Research) Program committee: Rebecca Bace (Infidel) Tim Grance (National Institute of Standards and Technology, USA) Ming-Yuh Huang (Boeing Applied Research and Technology, USA) Phil Porras (SRI International) Richard Lippmann (MIT Lincoln Laboratory) Eugene Spafford (CERIAS - Purdue University) Publicity and Review Organizing Committee: Jim Alves-Foss (University of Idaho) Tom Karygiannis (National Institute of Standards and Technology, USA) Peter Mell (National Institute of Standards and Technology, USA) SUBMISSIONS Papers which fall into the topic areas outlined above are particularly welcome, although contributions outside those topics may also be of interest (please contact the workshop chair if you have questions). We are requiring submission of an abstract (no more than 250 words, plain ASCII text) prior to submission of a full paper. This abstract will be used to better identify appropriate reviewers and to provide potential authors with feedback as to the likely suitability of their chosen topic. Short feedback as to the likely appropriateness of a paper following the outline provided in the abstract should be received within one or two weeks of the abstract's submission. Abstracts should include the name of the authors, phone number/email/fax/address information for one author (identified as the "correspondence author"), as well as the abstract itself, and should be sent to ccides () csds uidaho edu . When the full paper is submitted, it must be sent electronically to the address below, in an email which includes the following three files: 1. A separate title page in ASCII text with: a.. The title or topic b.. The name(s) of the authors, organizational affiliation(s), telephone and FAX numbers, postal address, and Internet electronic mail address for the contact author. The likely speaker should also be identified and must be registered for ACM CCS by the deadline below in advance in order to assist us in producing our program. Participation of one author is a required condition of acceptance. c.. The author to contact for correspondence about the paper d.. A short (less than 250 word) abstract 2. The paper itself in PDF a.. Up to twenty pages (12 point font); we anticipate most will be in the 12-15 page range b.. A brief biography of each author as appropriate (as a separate section at the end of the paper) 3. A release form (this will be emailed to authors who submit abstracts) Submitted papers must not have been previously published, or currently under consideration for publication elsewhere, or have substantial overlap with papers the author has submitted elsewhere. Accepted papers will be published in a proceedings (more information will be available later). Submissions should be sent to ccsids () csds uidaho edu. The subject line must have the following format: [CCSIDS] ContactAuthor Title Each submission will be acknowledged by e-mail. If acknowledgment is not received within seven days, please contact the program chair. Questions about ACM CCS should not be sent to the submission address; instead, please contact the CCS program committee as indicated below. BEST PAPER COMPETITION The best paper of the workshop will be selected by the reviewers, and announced at CCS 2000. PROCEEDINGS In addition to publication on the web, it is anticipated that all papers will be published in a proceedings after the colloquium. Details of this process are being investigated; information will be supplied to authors submitting papers and also provided on the CCS web site as soon as it is available. CORPORATE SPONSORS We solicit interested organizations to become sponsors, particularly in terms of reimbursing student travel and other expenses. Please contact Deborah Frincke at frincke () cs uidaho edu for information regarding sponsorship of the IDS workshop (those interested in sponsoring CCS as a whole should contact the CCS program committee). If we are able to provide student travel assistance through the help of our sponsors, this information will be made available to accepted authors in June. IMPORTANT DATES Deadline for abstract submission (confirmation of acceptability provided in one week) May 1, 2000 Deadline for paper submission June 7, 2000 Notification to Accepted Authors July 7, 2000 Camera-Ready Copy August 7, 2000 Registration Deadline for Accepted Authors * August 7 , 2000 .Workshop and CCS dates Nov 1-4, 2000 *since this is a workshop, at least one author must commit to attend CCS/IDS workshop for each accepted paper by the deadline above. FOR MORE INFORMATION a.. Sponsorship of IDS workshop: contact Deborah Frincke, frincke () cs uidaho edu b.. Information about the ACM CCS in general is available through the ACM CCS Web site: http://www.ccs2000.org/ ____________________________________________________________________________ ____ This message is for the named person's use only. It may contain confidential, proprietary or legally privileged information. No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. CREDIT SUISSE GROUP and each of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorised to state them to be the views of any such entity.
Current thread:
- [Mod FWD] Call for Papers -- Intrusion Detection Workshop Lister, Justin (Apr 03)
