The 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), previously known as Recent Advances in Intrusion Detection, aims at bringing together leading researchers and practitioners from academia, government, and industry to discuss novel research contributions related to computer and information security. RAID 2017 will be held in Atlanta, Georgia on September 18-20, 2017
The work described in this website has been conducted within the project NeCS. This project has received funding from the European Union’s Horizon 2020 (H2020) research and innovation programme under the Grant Agreement no 675320. This website and the content displayed in it do not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of its content.
With security established as a critical ICT attribute, one also needs to be able to scientifically quantify the levels of desired or achieved security assurance. This naturally needs to occur over the entire multi-level life-cycle of systems & services, e.g., from requirements elicitation to run-time operation and maintenance. Addressing such quantitative aspects, the QASA workshop aims to bring together researchers and practitioners interested in the research dimensions of quantification spanning dependability, security, privacy and risk.
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development
After the summer break we are going to hold our next Weber seminar on September the 6th at 15:00 CEST.
The speaker will be Mario Faiella from ATOS and the title of his talk is "Secure and Trusted Threat Intelligence Platform”.
The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
The International School on Foundations of Security Analysis and Design FOSAD is a one-week yearly school on cyber-security held in Bertinoro (Italy) in August-September. The main aim of the FOSAD school is to offer a good spectrum of current research in foundations of security - ranging from programming languages to analysis of protocols, from cryptographic algorithms to access control policies and trust management - that can be of help for graduate students and young researchers from academia or industry that intend to approach the field.
New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time.
Cloud computing is transforming the way large-scale computation is performed. Dynamic scalability or -elasticity- provided by the cloud make high-performance computing accessible to everyone. However, cloud computing introduces new challenges with respect to security and privacy. Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources.