From mboxrd@z Thu Jan 1 00:00:00 1970 X-Sympa-To: caml-list@inria.fr Received: from mail1-relais-roc.national.inria.fr (mail1-relais-roc.national.inria.fr [192.134.164.82]) by walapai.inria.fr (8.13.6/8.13.6) with ESMTP id q43JP4Kb007010 for ; Thu, 3 May 2012 21:25:04 +0200 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AhwBAEHaok+DmwITkWdsb2JhbABFsnsiAQEBAQkLCwcUBCOCLRUBBSEPBQs9FhgDAgECAUsNCAEBBROHcQuZKKFMiwCGCASXD4RljTaBUg X-IronPort-AV: E=Sophos;i="4.75,526,1330902000"; d="scan'208";a="156641567" Received: from mailhost.tue.nl ([131.155.2.19]) by mail1-smtp-roc.national.inria.fr with ESMTP/TLS/ADH-CAMELLIA256-SHA; 03 May 2012 21:24:58 +0200 Received: from pastinakel.tue.nl (localhost [127.0.0.1]) by mailhost.tue.nl (Postfix) with ESMTP id EC3E873093; Thu, 3 May 2012 21:24:57 +0200 (CEST) X-Virus-Scanned: amavisd-new at tue.nl Received: from mailhost.tue.nl ([131.155.2.19]) by pastinakel.tue.nl (pastinakel.tue.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JDkg2dzIfWlK; Thu, 3 May 2012 21:24:57 +0200 (CEST) Received: from [131.155.68.145] (dyn068145.nbw.tue.nl [131.155.68.145]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: nzannone) by mailhost.tue.nl (Postfix) with ESMTPSA id A898073090; Thu, 3 May 2012 21:24:57 +0200 (CEST) Message-ID: <4FA2DB88.8040308@tue.nl> Date: Thu, 03 May 2012 21:24:56 +0200 From: Nicola Zannone User-Agent: Mozilla/5.0 (X11; Linux i686; rv:11.0) Gecko/20120411 Thunderbird/11.0.1 MIME-Version: 1.0 To: "Zannone, N." Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit X-Validation-by: n.zannone@tue.nl Subject: [Caml-list] AISec 2012: Call for Papers (Apologies if you receive this message multiple times!) ========================================================================= CALL FOR PAPERS 5th ACM Workshop on Artificial Intelligence and Security (AISec) http://research.microsoft.com/en-us/events/aisec2012/default.aspx Held in Conjunction with ACM CCS 2012 October 19, 2012 Sheraton Raleigh, NC, USA ========================================================================= The applications of artificial intelligence, machine learning, and data mining for security and privacy problems continues to grow. One recent trend is the growth of Big Data Analytics and the establishment of Security Information and Event Management systems built to obtain security intelligence and situational awareness. With the advent of cloud computing, every advantage the cloud offers, such as large-scale machine learning and data-driven abuse detection, is being leveraged to improve security. We invite original research papers describing the use of AI or machine learning in security and privacy problems. We also invite position and open problem papers discussing the role of AI or machine learning in security and privacy. Submitted papers of these types may not substantially overlap papers that have been published previously or that are simultaneously submitted to a journal or conference/workshop proceedings. Finally we welcome a new systematization of knowledge category of papers this year, which should distill the AI or machine learning contributions of a previously published series of security papers. Regular research, systematization of knowledge, and open/position paper submissions must be at most 10 pages in double-column ACM format (note: pages must be numbered) excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read the appendices, so the paper should be intelligible without them. Submissions need not be anonymized. We recommend the use of the ACM SIG Proceedings templates for submissions. The ACM format is the required template for the camera-ready version. Accepted papers will be published by the ACM Digital Library and/or ACM Press. Submissions can be made through EasyChair using the following link: http://www.easychair.org/conferences/?conf=aisec2012 Topics of interest include, but are not limited to: • Adversarial Learning • Robust Statistics • Online Learning • Computer Forensics • Spam detection • Botnet detection • Intrusion detection • Malware identification • Big data analytics for security • Adaptive side-channel attacks • Privacy-preserving data mining • Design and analysis of CAPTCHAs • Phishing detection and prevention • AI approaches to trust and reputation • Vulnerability testing through intelligent probing (e.g. fuzzing) • Content-driven security policy management & access control • Techniques and methods for generating training and test sets • Anomalous behavior detection (e.g. for the purposes of fraud prevention, authentication) Schedule Submissions due: July 16, 2012 (23:59 PDT) Acceptance notification: August 13, 2012 Final manuscript due: August 24, 2012 Workshop date: October 19, 2012