GraMSec 2020

The Seventh International Workshop on
Graphical Models for Security

June 22, 2020

Co-located with CSF 2020



We are excited to have Prof. Marielle Stoelinga (University of Twente, the Netherlands) as the keynote speaker this year.
The submission deadline has been extended till May 4th, 2020.
GraMSec 2020 post-proceedings will be published in the Lecture Notes in Computer Science series (Springer).
Due to the coronavirus outbreak, IEEE CSF will take place online this year. Therefore, GraMSec too will be held online on June 22, 2020. We will provide information about the participation and registration as soon as possible.


The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security researchers, as well as security professionals from the industry and government, have proposed various graphical security models, metrics, and measurements. Graphical models are used to capture different security facets and address a range of challenges including security assessment, automated defence, secure services composition, security policy validation, and verification. The International Workshop on Graphical Models for Security is an established scientific event dedicated to study and exchange of experiences on graphical security and safety modelling.


This year, we are particularly keen to encourage excellent submissions related, but not restricted, to the following broad headings:
  • Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security and safety
  • Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modelling tools in security
  • Machine learning: modelling and reasoning about the role of big data and machine learning in security operations
  • Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
  • Risk analysis and management: models and graphical methodologies for security and privacy risk management in business and organizational architectures
  • Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry.
  • Semantics: developing or studying semantic approaches to graph-based models used in security like set theoretic models, categorical models, logical models, etc.
  • Threat modelling: modelling and analyzing software systems security, models for DevSecOps, etc.
  • Security requirements: models and tools for describing and analyzing requirements on system security and privacy.
  • Visual security: modelling and analytics for security visualizations.
  • Secure systems: safe and secure system design, quantification of security/safety, models for system security/safety evaluation.

We welcome a broad range of contributions: from theory to tools and experience reports. Preference will be given to papers likely to stimulate high-quality debate at the Workshop.


  Augusta University logo   Leiden University logo   UL logo