The 16th International Symposium on Research in Attacks, Intrusions and Defenses aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to any area of computer and information security. You may contact one of cheap ghostwriters for hire if you're interested in this topic.
As in previous years, all topics related to intrusion detection and prevention are within scope. In addition, topics of interest also include but are not limited to:
- Intrusion detection and prevention
- Malware prevention, detection, analysis, and containment
- Embedded Systems security, including Smartphone security
- Active Defenses
- Web application security
- New attacks against computers and networks
- Insider attack detection
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis
- Secure Software Development
- Adversarial machine learning for security
- Computer Security visualization techniques
- Network exfiltration
- Botnet analysis, detection, and mitigation
- Phishing and Spam detection and prevention
- Online money laundering and Underground economy
- Hardware vulnerabilities
- Binary analysis and Reverse engineering
- Digital forensics
- Security and privacy in cloud computing
- Security and privacy of social networks
|Paper submission deadline:||April 1, 2013 11:59pm EDT
|April 8, 2013 11:59pm EDT (extended)
|Paper reviews due:||May 14, 2013 11:59pm EDT
|Paper notification:||May 24, 2013
|Poster submission deadline:||June 14, 2013 11:59PM EDT (modified)
|Final paper camera-ready copy:||June 14, 2013
|Poster acceptance or rejection:||July 18, 2013
RAID 2013 invites two types of submissions:
- Full papers papers presenting mature and novel research results. Papers accepted by the Program Committee will be presented at RAID 2013 and included in the Symposium's proceedings published by Springer in its Lecture Notes in Computer Science series. Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices.
- Note (10/7): Posters are to be printed at A0 size: 841mm × 1189mm (33.1" × 46.8"). Please bring the printed poster along with you to the conference.
Poster abstracts describing works in progress, or innovative ideas not mature enough to be presented as a full paper. Posters are submitted for review in the form of an extended abstract that has to be formatted in LNCS-style and not exceed 2 pages in length. In addition, posters titles should always start with the phrase "Poster Abstract:". Accepted posters will appear in the proceedings and will be presented at the symposium in a separate session.
All submissions (papers and poster abstracts) must be formatted according to the instructions provided by Springer and then submitted electronically here. Papers must list all authors and their affiliations; RAID does not require anonymized submissions. For accepted papers, at least one of the authors must attend the conference to present the paper. Submissions must not substantially duplicate work that has already been published elsewhere or is submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. Further questions on the submission process may be sent to the program chairs at .
(All submissions closed.)
The Program Committee members will select the best paper to be announced and awarded at the last session of the conference.