Call for Papers

2018 Cyber and Information Security Research Conference (CISRC18)

Submit papers and poster abstracts using EasyChair. Visit
http://easychair.org/conferences/?conf=cisrc18.

Important Dates
All deadlines are 23:59:59 EST

[one_half]
Submission Deadline (Full Papers)
Notification of Acceptance (Full Papers)
Submission Deadline (Short Papers / Poster Abstracts)
Notification of Acceptance (Short Papers / Poster Abstracts)
Early Registration Deadline
Registration Deadline
[/one_half]

[one_half_last]
Sunday, 3 December 2017
Friday, 12 January 2018
Sunday, 4 February 2018
Friday, 23 February 2018
Sunday, 4 March 2018
Friday, 16 March 2018

[/one_half_last]

Note: Registration deadline is firm due to access controls for the national laboratory.
Registration


Cyberspace is fundamental to our national prosperity, as it is critical to commerce, research,
education, and government. Realizing the benefits of this shared environment requires that we
are able to properly balance the risks and rewards, understand and communicate threats to
security and privacy, and rapidly adapt any resulting approach to a changing adversarial
environment.

The 13th annual Cyber and Information Security Conference (CISRC) at Oak Ridge National
Laboratory in Oak Ridge, Tennessee, will bring together cyber security researchers from
academia, industry, and the national laboratories with program managers, security vendors, and
practitioners to discuss the many challenges and to propose novel solutions pertaining to cyber
security.

Research Themes

Research papers describing novel contributions in any area of cyber and information security
are solicited. Papers may present techniques, applications, practical experience, theory,
analysis, or experiments and evaluations. We encourage the submission of papers on
technologies and methods that promise to improve cyber security practices, including, but not
limited to, the following areas:

[one_half]

  • Cloud Security
  • Quantifying Risk
  • Operational / End­User Implications
  • Fusion of Heterogeneous Data
  • Trend Analysis & Discovery
  • Malware Analysis
  • Trust Negotiations
  • Policy
  • Data Protection
  • Authentication
  • Encryption
  • Software Assurance
  • Malware Analysis

[/one_half]

[one_half_last]

  • Hardware Assurance
  • Reverse Engineering
  • Anomaly & Intrusion Detection
  • Machine Learning
  • Information Extraction
  • Mathematical Techniques
  • Human Factors
  • Visualization
  • Modeling Adversaries
  • Moving Target Defense
  • SCADA Systems
  • Control Theory
  • Connected  and Autonomous Vehicles

[/one_half_last]

 Submissions
Submissions may be full or short papers, or an abstract for a poster .

  • Full paper submissions should present original cyber security research. Papers should
    be at most 8 pages, excluding references and acknowledgments.
  • Short paper submissions may showcase late-breaking results, works in progress, or
    preliminary results. Short papers may be up to 4 pages in length, excluding references
    and acknowledgments.
  • Poster abstracts are limited to 2 pages, total. Posters should showcase early-stage
    investigations or recent results.

Submissions not meeting these guidelines will be rejected without consideration of their merit.
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings.

All full and short papers will be peer-reviewed in a double-blind review process. All accepted
papers will be archived in the ACM International Conference Proceedings Series, and will be
published by the ACM International Conference Proceedings Series.

Poster abstracts will be reviewed by the Poster Session Chair for inclusion. Posters and their
abstracts are not archived in the ACM digital library, but will be made available through the
conference web site.

Anonymous Submissions
All papers must be appropriately written for anonymous review. No author names or affiliations
should appear and should avoid revealing their identity in the text. Self-reference should be in
the third-person, or redacted if that is not feasible. Latex users, use

Submission Instructions
Authors should use the ACM Master Article Template; please use the sigconf format:
http://www.acm.org/publications/proceedings-template.

To accommodate double-blind review, LaTeX users, should use \documentclass[sigconf,anonymous]{acmart}
for initial submission.

Authors of accepted papers must guarantee that their papers will be presented at the
conference.

Full submission and registration information can be found at:
http://aiexpo.ornl.gov/