RAID 2014

Call for Papers
Call for Papers

Topics

The 17th International Symposium on Research in Attacks, Intrusions and Defenses aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to any area of computer and information security.

As in previous years, all topics related to intrusion detection and prevention are within scope. In addition, topics of interest also include but are not limited to:

Important Dates

Paper Submission Deadline: Submission is closed.
Paper Acceptance Notification: June 1, 2014
Camera Ready Papers Due: July 7, 2014

Poster Submission Deadline: July 1, 2014
Poster Acceptance or Rejection: July 5, 2014

Types of Submissions

RAID 2014 invites two types of submissions:

  1. Full papers papers presenting mature and novel research results. Papers accepted by the Program Committee will be presented at RAID 2014 and included in the Symposium's proceedings published by Springer in its Lecture Notes in Computer Science series. Each paper must include an abstract and a list of keywords, and must not exceed 20 pages in total length, formatted in LNCS-style and including the bibliography and any appendices.

  2. Poster abstracts describing works in progress, or innovative ideas not mature enough to be presented as a full paper. The poster track will provide an opportunity to present early-stage work and receive feedback from the community, especially on thought-provoking or controversial work, approaches, or ideas from students. We also welcome submissions of posters corresponding to papers presented at RAID-affiliated workshops. Posters are submitted for review in the form of an extended abstract that has to be formatted in LNCS-style and not exceed 1 page in length, with a PDF draft of the proposed poster included as page 2 of the submission. In addition, poster titles should always start with the phrase "Poster Abstract:". Accepted posters will be presented at the symposium in a separate session. Authors of accepted full papers are also encouraged to submit and present posters of their paper in the poster session. The board where posters will be fastened is in portrait mode; height: 1,60m, width: 1,20m.

Papers must list all authors and their affiliations; RAID does not require anonymized submissions. For accepted papers, at least one of the authors must attend the conference to present the paper. Submissions must not substantially duplicate work that has already been published elsewhere or is submitted in parallel to a journal or to any other conference or workshop with proceedings. Simultaneous submission of the same work to multiple venues, submission of previously published work, and plagiarism constitute dishonesty or fraud. RAID, like other scientific and technical conferences and journals, prohibits these practices and may, on the recommendation of the program chair, take action against authors who have committed them. Further questions on the submission process may be sent to the program chairs.


Best Paper

The Program Committee members will select the best paper to be announced and awarded at the last session of the conference.

RAID 2013 Credit - David Tagatac, Jill Jermyn, Nathaniel Boggs    |    Adapted for RAID 2014 - Anneli Andersson, Anna Wallin, Sandra Arvidsson