RAID 2013

Call for Papers

Call for Papers (also available in PDF)

Topics

The 16th International Symposium on Research in Attacks, Intrusions and Defenses aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to any area of computer and information security.

As in previous years, all topics related to intrusion detection and prevention are within scope. In addition, topics of interest also include but are not limited to:

Important Dates

Paper submission deadline: April 1, 2013 11:59pm EDT
  April 8, 2013 11:59pm EDT (extended)

Paper reviews due: May 14, 2013 11:59pm EDT
Paper notification: May 24, 2013
Poster submission deadline: June 14, 2013 11:59PM EDT (modified)
Final paper camera-ready copy: June 14, 2013
Poster acceptance or rejection: July 18, 2013

Types of Submissions

RAID 2013 invites two types of submissions:

  1. Full papers papers presenting mature and novel research results. Papers accepted by the Program Committee will be presented at RAID 2013 and included in the Symposium's proceedings published by Springer in its Lecture Notes in Computer Science series. Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices.

  2. Note (10/7): Posters are to be printed at A0 size: 841mm × 1189mm (33.1" × 46.8"). Please bring the printed poster along with you to the conference.
    Poster abstracts describing works in progress, or innovative ideas not mature enough to be presented as a full paper. Posters are submitted for review in the form of an extended abstract that has to be formatted in LNCS-style and not exceed 2 pages in length. In addition, posters titles should always start with the phrase "Poster Abstract:". Accepted posters will appear in the proceedings and will be presented at the symposium in a separate session.

All submissions (papers and poster abstracts) must be formatted according to the instructions provided by Springer and then submitted electronically here. Papers must list all authors and their affiliations; RAID does not require anonymized submissions. For accepted papers, at least one of the authors must attend the conference to present the paper. Submissions must not substantially duplicate work that has already been published elsewhere or is submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. Further questions on the submission process may be sent to the program chairs at .


SUBMISSION LINK
(All submissions closed.)

Best Paper

The Program Committee members will select the best paper to be announced and awarded at the last session of the conference.

RAID 2012 Credit - Stefano Ortolani    |    Adapted for RAID 2013 - David Tagatac, Jill Jermyn, Nathaniel Boggs