CfP Graphical Models for Security (GraMSec 2019)

February 28, 2019

GraMSec 2019: The Sixth International Workshop on Graphical Models for Security Hoboken, NJ, USA - June 24, 2019
Co-located with CSF 2019 *Submissions received by April 5 receive priority consideration*

SCOPE
The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security researchers, as well as security professionals from the industry and government, have proposed various graphical security models, metrics, and measurements. Graphical models are used to capture different security facets and address a range of challenges including security assessment, automated defence, secure services composition, security policy validation, and verification. For example, attack graphs, attack trees, attack-defence trees, and attack countermeasure trees represent possible ways of attacking and defending a system while misuse cases and mal-activity diagrams capture threats and abusive behaviour of users. http://gramsec.uni.lu

TOPICS
This year, we encourage excellent submissions related, but not restricted, to the following broad headings:

  1. Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security
  2. Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modelling tools in security
  3. Machine learning: modelling and reasoning about the role of big data and machine learning in security operations
  4. Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
  5. Risk analysis and management: models of risk management in business and organizational architectures
  6. Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry.

Preference will be given to papers likely to stimulate high-quality debate at the Workshop.

SUBMISSION GUIDELINES
We solicit two types of submissions:

  • Regular papers (up to 15 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work within the scope of the workshop.
  • Short papers (up to 7 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work in progress.

The reviewers are not required to read the appendices, so the papers should be intelligible without them. All submissions must be prepared using the LNCS style. Each paper will undergo a thorough review process.

Submissions should be made using the GraMSec 2019 EasyChair website: https://easychair.org/conferences/?conf=gramsec2019.

PUBLICATION
As in previous editions, post-proceedings will been made available in the Lecture Notes in Computer Science (LNCS) series, published by Springer. This will published after the workshop, thus permiting the authors to incorporate feedback.

IMPORTANT DATES (NOTE THE TWO SUBMISSION DEADLINES)
Early submissions (priority in program, and early notification)

  • Early paper submission due: Friday, April 5, 2019
  • Notification for early submissions: Friday, May 3, 2019

Late submissions (after CSF notification)

  • Late paper submission due: Monday, April 22, 2019
  • Notification for late submissions: Monday, May 13, 2019
  • Camera ready versions due: Monday, May 27
  • Workshop: Monday, June 24. 2019

INVITED SPEAKER
George Cybenko, Dartmouth College

PROGRAM CHAIRS
Massimiliano Albanese, George Mason University, VA, USA Ross Horne, University of Luxembourg, Luxembourg

GENERAL CHAIR
Christian W. Probst, Unitec, New Zealand

STEERING COMMITTEE
Sushil Jajodia, George Mason University, USA Barbara Kordy, INSA Rennes, IRISA, FR Sjouke Mauw, University of Luxembourg, Luxembourg Christian W. Probst, Unitec, New Zealand Ketil Stølen, SINTEF Digital and University of Oslo, Norway

PC MEMBERS
Ludovic Apvrille, Telecom ParisTech, France Zaruhi Aslanyan, Alexandra Institute, Denmark Stefano Bistarelli, Università di Perugia, Italy Hasan Cam, U.S. Army Research Laboratory, PA, USA Nora Cuppens-Boulahia, IMT Atlantique, France Harley Eades III, Augusta University, GA, USA Olga Gadyatskaya, SnT, University of Luxembourg, Luxembourg René Rydhof Hansen, Aalborg University, Denmark Jin B. Hong, University of Western Australia, Australia DongSeong Kim, The University of Queensland, New Zealand Barbara Kordy, INSA Rennes, IRISA, France Sjouke Mauw, University of Luxembourg, Luxembourg Per Håkon Meland, SINTEF ICT, Norway Guozhu Meng, Chinese Academy of Sciences, Beijing, China Guy McCusker, University of Bath, United Kingdom Vivek Nigam, fortiss GmbH, Germany Andreas Lothe Opdahl, University of Bergen, Norway Noseong Park, George Mason University, VA, USA Stéphane Paul, Thales Research and Technology, France Sophie Pinchinat, INSA Rennes, France Sasa Radomirovic, University of Dundee, United Kingdom Rolando Trujillo Rasúa, Deakin University, Australia Paul Rowe, The MITRE Corporation, MA, USA Giedre Sabaliauskaite, Singapore University of Technology and Design, Singapore Ketil Stølen, SINTEF, Norway Sridhar Venkatesan, Vencore Labs, VA, USA