SUBMISSION GUIDELINES
We solicit two types of submissions:
- Regular papers (up to 18 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work within the scope of the workshop.
- Short papers (up to 10 pages, excluding the bibliography and well-marked appendices) describing original and unpublished work in progress.
The reviewers are not required to read the appendices, so the papers should be intelligible without them. All submissions must be prepared using the LNCS style. Each paper will undergo a thorough review process. Submissions should be made using the GraMSec 2020 EasyChair website.
LIST OF TOPICS
This year, we are particularly keen to encourage excellent submissions related, but not restricted, to the following broad headings:
- Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security
- Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modelling tools in security
- Machine learning: modelling and reasoning about the role of big data and machine learning in security operations
- Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
- Risk analysis and management: models of risk management in business and organizational architectures
- Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry.
- Semantics: developing or studying semantic approaches to graph-based models used in security like set theoretic models, categorical models, logical models, etc.
- Threat modelling: modelling and analysing software systems security, models for DevSecOps, etc.
- Security requirements: models and tools for describing and analysing requirements on system security and privacy.
- Visual security: modelling and analytics for security visualisations.
- Secure systems: safe and secure system design, quantification of security/safety, models for system security/safety evaluation.
We welcome a broad range of contributions: from theory to tools and experience reports. Preference will be given to papers likely to stimulate high-quality debate at the Workshop.
PUBLICATION
The proceedings of the workshop will be published in the Lecture Notes in Computer Science (LNCS) series, published by Springer. We will adopt a post-proceedings format, meaning that it will be published after the workshop, permitting the authors to incorporate feedback from during the workshop.