Conference Information
RAID 2019: International Symposium on Research in Attacks, Intrusions and Defenses
http://www.raid-2019.org/
Submission Date:
2019-04-02
Notification Date:
2019-05-29
Conference Date:
2019-09-23
Location:
Beijing, China
Years:
22
CCF: b   CORE: a   QUALIS: a2   Viewed: 9964   Tracked: 44   Attend: 2

Conference Location
Advertisment
Call For Papers
 Since its inception in 1997, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community.

The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity.

This year we are soliciting research papers on topics covering all well-motivated computer security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons learned. Specific topics of interest to RAID include, but are not limited to:

    Computer, network, and cloud computing security
    Malware and unwanted software
    Program analysis and reverse engineering
    Mobile Security
    Web security and privacy
    Vulnerability analysis techniques
    Usable security and privacy
    Intrusion detection and prevention
    Hardware security
    Cyber physical systems security and threats against critical infrastructures
    IoT security
    Statistical and adversarial learning for computer security
    Cyber crime and underground economies
    Denial-of-Service attacks and defenses
    Security measurement studies
    Digital forensics

Papers will be judged on novelty, significance, correctness, and clarity. We expect all papers to provide enough detail to enable reproducibility of their experimental results. We encourage authors to make both the tools and data publicly available. 
Last updated by Dou Sun in 2019-05-01
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20171052120%
2016842125%
20151192823.5%
20141132219.5%
2013952223.2%
2012841821.4%
2011872023%
20101042423.1%
2009591728.8%
2008802025%
20071001818%
2006931617.2%
2005831720.5%
20041181411.9%
2003441329.5%
2002641625%
2001551221.8%
2000261453.8%
1998523567.3%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
GIISGlobal Information Infrastructure and Networking Symposium2018-08-192018-09-012018-10-23
MCSIInternational Conference Mathematics and Computers in Sciences and Industry2018-06-302018-07-202018-08-25
aa*a1SIGIRInternational Conference on Research and Development in Information Retrieval2019-01-15 2019-07-21
HOSTIEEE International Symposium on Hardware-Oriented Security and Trust2017-10-092018-01-152018-05-01
ab1ISMMInternational Symposium on Memory Management2015-02-192015-03-232015-06-13
MSPNInternational Conference on Mobile, Secure and Programmable Networking2019-02-152019-03-012019-04-23
CACS'International Automatic Control Conference2018-08-312018-09-252018-11-04
SCAI'International Conference on Soft Computing, Artificial Intelligence and Applications2018-10-282018-11-202018-12-22
bSANERIEEE International Conference on Software Analysis, Evolution, and Reengineering2019-10-182019-12-062020-02-16
bISCITInternational Symposium on Communications and Information Technologies2015-05-112015-06-222015-10-07
Related Journals
Recommendation