infosec-news February 2011 archive
Main Archive Page > Month Archives  > infosec-news archives
infosec-news: [ISN] CFP: 3rd Workshop on Intelligent Security -

[ISN] CFP: 3rd Workshop on Intelligent Security - Security and Artificial Intelligence (SecArt-11)

From: InfoSec News <alerts_at_nospam>
Date: Tue Feb 15 2011 - 06:46:02 GMT

Forwarded from: Yacine Zemali <yacine.zemali (at)>

[Apologies if you receive multiple copies. Please distribute this call
to interested parties.]

                            CALL FOR PAPERS

                   3rd Workshop on Intelligent Security
             Security and Artificial Intelligence (SecArt-11)


As part of the 22nd International Joint Conference on Artificial
Intelligence - IJCAI-11 (

                           July 18, 2011
                          Barcelona, Spain


Our increasingly networked world continues to provide new opportunities
for security breaches that have severe consequences at the personal
level (identity theft, and resulting financial losses), for businesses
(theft of intellectual property, or business plans, or costly responses
to the theft of customer data), and for governments. Computing and the
internet have become crucial parts of the infrastructure of almost every
significant commercial or governmental enterprise. Turning off the
computers or disconnecting from the network has become tantamount to
turning off the power.

The use of techniques drawn from AI is increasingly relevant as the
scale of the problem increases, in terms of the size and complexity of
the networks being protected, the variety of applications and services
provided using that infrastructure, and the sophistication of the
attacks being made. With this workshop, we hope to encourage dialogue
and collaboration between the AI and Security communities. Further, we
hope that this will foster a continuing interaction. Previous workshops
in this area include the ICAPS-09 and AAAI-10 workshops on Intelligent
Security, as well as three workshops held in conjunction with the ACM
Conference on Computer and Communications Security (CCS), in 2008, 2009,
and 2010.

Topics of interest for this workshop include, but are not limited to,
the following:

* Knowledge Representation and Engineering for Cyber Security
* Secure Web Services
* Development of Trusted Software
* Data Mining and Forensics
* Data Mining Malware
* Automated Vulnerability Analysis
* Automated Exploit and Attack Generation
* Automated Alerting and Response
* Diagnosis and Plan Recognition
* Automating Security Analyses and Audits
* Artificial Immune Systems
* Privacy and Confidentiality
* Intelligent User Interfaces for Security Applications
* Security and Organizational Structure

The emphasis for this one-day workshop will be on discussion and
interaction among the workshop participants, grounded in and motivated
by a limited number of presentations drawn from full paper submissions,
as well as an invited speaker.


Please use the following EasyChair link for submitting your paper:

We will accept either full papers for presentation or position papers
outlining the author's background, interests, and suggested topics for
or contributions to the workshop. All submissions should be preferably
in PDF format according to AAAI's style.

For *submissions* of full papers the max. length is 8, while for
*publication* of accepted papers, it will be between 6 and 8, depending
on the number of papers accepted. The max. length of position/short
papers is 2 pages.


* Deadline for submissions: April 4, 2011
* Notification: May 9, 2011
* Camera-ready paper due: May 23, 2011
* Workshop: July 18, 2011


* Bob Balzer (Teknowledge, US)
* Chris Geib (University of Edinburgh, GB)
* Robert P. Goldman (SIFT, US)
* Alessio Lomuscio (Imperial College London, GB)
* Norbert Pohlmann (Internet-Sicherheit, Germany)
* Anil Somayaji (Carleton University, CA)
* Tim Strayer (BBN Technologies, US)
* Dan Thomsen (SIFT, US)
* Frederic Cuppens (Telecom Bretagne, France)
* Joerg Hoffmann (INRIA Nancy, France)
* Thorsten Holz (Ruhr-University Bochum, Germany)
* Rachel Greenstadt (Drexel University, US)
* Karsten Sohr (University of Bremen, Germany)


Mark Boddy
Adventium Labs
111 Third Avenue South, Suite 100
Minneapolis, MN 55401, USA
Email: mark.boddy (at)

Stefan Edelkamp
Technologie-Zentrum Informatik
Am Fallturm 1, Raum 2.62
28357 Universität Bremen, Germany
Email: edelkamp (at)

Yacine Zemali
ENSI de Bourges
LIFO - EA 4022
88 Boulevard Lahitolle
18020 Bourges Cedex, France
Email: yacine.zemali (at)

Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery
Network, Cisco Switches, SAS 70 Type II Datacenter.
Find peace of mind, Defend your Critical Infrastructure.