Wednesday, February 27, 2019

[DMANET] Graphical Models for Security (GraMSec 2019) - CFP

GraMSec 2019: The Sixth International Workshop on Graphical Models for
Hoboken, NJ, USA - June 24, 2019
Co-located with CSF 2019

*Submissions received by April 5 receive priority consideration*

The use of graphical security models to represent and analyse the
security of systems has gained an increasing research attention over the
last two decades. Formal methods and computer security researchers, as
well as security professionals from the industry and government, have
proposed various graphical security models, metrics, and measurements.
Graphical models are used to capture different security facets and
address a range of challenges including security assessment, automated
defence, secure services composition, security policy validation, and
verification. For example, attack graphs, attack trees, attack-defence
trees, and attack countermeasure trees represent possible ways of
attacking and defending a system while misuse cases and mal-activity
diagrams capture threats and abusive behaviour of users.

This year, we encourage excellent submissions related, but not
restricted, to the following broad headings:
1. Graph representations: mathematical, conceptual, and implemented
tools for describing and reasoning about security
2. Logical approaches: formal logical tools for representing and
reasoning about graphs and their use as modelling tools in security
3. Machine learning: modelling and reasoning about the role of big data
and machine learning in security operations
4. Networks in national security: terrorist networks, counter-terrorism
networks; safety in national infrastructure (e.g., utilities and
5. Risk analysis and management: models of risk management in business
and organizational architectures
6. Social networks: using and reasoning about social graphs, network
analysis, network protocols, social mapping, sociometry.
Preference will be given to papers likely to stimulate high-quality
debate at the Workshop.

We solicit two types of submissions:
- Regular papers (up to 15 pages, excluding the bibliography and
well-marked appendices) describing original and unpublished work within
the scope of the workshop.
- Short papers (up to 7 pages, excluding the bibliography and
well-marked appendices) describing original and unpublished work in

The reviewers are not required to read the appendices, so the papers
should be intelligible without them. All submissions must be prepared
using the LNCS style. Each paper will undergo a thorough review process.
Submissions should be made using the GraMSec 2019 EasyChair website:

As in previous editions, post-proceedings will been made available in
the Lecture Notes in Computer Science (LNCS) series, published by
Springer. This will published after the workshop, thus permiting the
authors to incorporate feedback.

Early submissions (priority in program, and early notification)
- Early paper submission due: Friday, April 5, 2019
- Notification for early submissions: Friday, May 3, 2019

Late submissions (after CSF notification)
- Late paper submission due: Monday, April 22, 2019
- Notification for late submissions: Monday, May 13, 2019

- Camera ready versions due: Monday, May 27
- Workshop: Monday, June 24. 2019

George Cybenko, Dartmouth College

Massimiliano Albanese, George Mason University, VA, USA
Ross Horne, University of Luxembourg, Luxembourg

Christian W. Probst, Unitec, New Zealand

Sushil Jajodia, George Mason University, USA
Barbara Kordy, INSA Rennes, IRISA, FR
Sjouke Mauw, University of Luxembourg, Luxembourg
Christian W. Probst, Unitec, New Zealand
Ketil Stølen, SINTEF Digital and University of Oslo, Norway

Ludovic Apvrille, Telecom ParisTech, France
Zaruhi Aslanyan, Alexandra Institute, Denmark
Stefano Bistarelli, Università di Perugia, Italy
Hasan Cam, U.S. Army Research Laboratory, PA, USA
Nora Cuppens-Boulahia, IMT Atlantique, France
Harley Eades III, Augusta University, GA, USA
Olga Gadyatskaya, SnT, University of Luxembourg, Luxembourg
René Rydhof Hansen, Aalborg University, Denmark
Jin B. Hong, University of Western Australia, Australia
DongSeong Kim, The University of Queensland, New Zealand
Barbara Kordy, INSA Rennes, IRISA, France
Sjouke Mauw, University of Luxembourg, Luxembourg
Per Håkon Meland, SINTEF ICT, Norway
Guozhu Meng, Chinese Academy of Sciences, Beijing, China
Guy McCusker, University of Bath, United Kingdom
Vivek Nigam, fortiss GmbH, Germany
Andreas Lothe Opdahl, University of Bergen, Norway
Noseong Park, George Mason University, VA, USA
Stéphane Paul, Thales Research and Technology, France
Sophie Pinchinat, INSA Rennes, France
Sasa Radomirovic, University of Dundee, United Kingdom
Rolando Trujillo Rasúa, Deakin University, Australia
Paul Rowe, The MITRE Corporation, MA, USA
Giedre Sabaliauskaite, Singapore University of Technology and Design,
Ketil Stølen, SINTEF, Norway
Sridhar Venkatesan, Vencore Labs, VA, USA

Ibifubara Iganibo, George Mason University, VA, USA
* Contributions to be spread via DMANET are submitted to
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.