This year, we are particularly keen to encourage excellent submissions related, but not restricted, to the following broad headings:
- Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security and safety
- Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modelling tools in security
- Machine learning: modelling and reasoning about the role of big data and machine learning in security operations
- Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
- Risk analysis and management: models and graphical methodologies for security and privacy risk management in business and organizational architectures
- Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry.
- Semantics: developing or studying semantic approaches to graph-based models used in security like set theoretic models, categorical models, logical models, etc.
- Threat modelling: modelling and analyzing software systems security, models for DevSecOps, etc.
- Security requirements: models and tools for describing and analyzing requirements on system security and privacy.
- Visual security: modelling and analytics for security visualizations.
- Secure systems: safe and secure system design, quantification of security/safety, models for system security/safety evaluation.