AOH :: ISNQ5989.HTM

Deadline Extension: CSIIRW 6th Cyber Security & Information Intelligence Research Workshop




Deadline Extension: CSIIRW 6th Cyber Security & Information Intelligence Research Workshop
Deadline Extension: CSIIRW 6th Cyber Security & Information Intelligence Research Workshop



Forwarded from: Frederick Sheldon 

CALL FOR ABSTRACTS

CSIIRW-10
http://www.csiir.ornl.gov/csiirw 
 
April 21-23, 2010
 
Sixth Cyber Security and Information Intelligence Research Workshop 
Oak Ridge National Laboratory
CSIIRW-09 Proceedings

___________________________________________________
IMPORTANT DATES in 2010:
 
  Mar 15 	Extended abstracts (up to 4 pages) submitted 
  Mar 22 	Author notification
  Apr 02 	Early registration deadline
  Apr 19 	Submission of presentation slides and final revised 
              	extended abstracts
 
  May 29 	Publication of CSIIR Workshop Proceedings in ACM Digital  
               	Library (including extended abstracts and presentations)
 
  Jun 15 	Submission deadline of full papers (optional) to HICSS 
                Information Security and Cyber Crime Research Minitrack
___________________________________________________
SYNOPSIS:
 
Despite ubiquitous dependence on electronic information and on the
networked computing infrastructure, cyber security practice and policy
is largely heuristic, reactive, and increasingly cumbersome, struggling 
to keep pace with rapidly evolving threats. Advancing beyond this 
reactive posture will require a transformation in computing and 
communication systems architecture and new capabilities that do not 
merely solve todays security problems, but render them obsolete. 
___________________________________________________
IMPORTANT GOALS:
 
The aim of this workshop is to discuss (and publish) novel theoretical 
and empirical research focused on the many different aspects of 
cyber security and information intelligence. The scope will vary 
from methodologies and tools to systems and applications to more 
precise definition of the various problems and impacts. 
 
We encourage the participation of researchers and practitioners from 
a wide range of professional disciplines to ensure a comprehensive 
understanding of the needs, stakes and the ever evolving context
of cyberspace.
___________________________________________________
NON-EXCLUSIVE TOPICS
 
Consider the following non-exclusive topics: 
 + Scalable trustworthy systems (hardware enabled trust and 
    moving target defenses)
 + Enterprise-level metrics (cyber economics)
 + Coping with insider and life-cycle threats
 + Coping with malware and polymorphism (black/white lists 
     and dynamic program analysis)
 + Phishing/whaling, spam and cyber crime
 + High assurance system survivability
 + Cyber security for the Smart Grid
 + Digital provenance and data integrity
 + Privacy-aware security and usable security
 + Social networking models for managing trust and security 
___________________________________________________
KEYNOTE SPEAKERS:

 + Keynote speakers are still being finalized. Check the web site.    
___________________________________________________
SUBMISSION INSTRUCTIONS:
 
Participants are invited to submit extended abstracts of no more 
than four pages (single-spaced) by March 1. Read the full 
submission instructions and visit the submission site.
___________________________________________________
ORGANIZATION:
 
General Chairs:
 
  +  Frederick T. Sheldon and Stacy J. Prowell
      Computational Sciences and Engineering Division
      Oak Ridge National Laboratory
 
Program Co-Chairs:
 
  +  Elisa Bertino, CERIAS      
      Purdue University
  
  +  Greg Peterson, Department of EECS
      University of Tennessee

  +  Axel Krings, Computer Science Department
      University of Idaho


___________________________________________________________
Register now for HITBSecConf2010 - Dubai, the premier 
deep-knowledge network security event in the GCC, 
featuring keynote speakers John Viega and Matt Watchinski! 
http://conference.hitb.org/hitbsecconf2010dxb/ 



Site design & layout copyright © 1986-2014 CodeGods