Call for Papers

Paper preparation and submission instructions: CLICK HERE


Important Dates: CLICK HERE

The papers accepted at RSDA 2016 will be included in the DSN Supplemental Proceedings as well as in the DSN-W volume on IEEE Xplore.


Scope of RSDA


Computer systems are the basis for daily human activities and, more importantly, they play a key role in a variety of critical domains. Assessing dependability properties of computer systems is today an important concern for engineers and practitioners.

The analysis of textual/numeric data and log files produced under real workload conditions by applications, systems, and networks, intrusion detection systems, monitors and issue-trackers plays a key role for dependability assessment. Data analysis is crucial in a variety of engineering tasks, such as measuring availability and reliability of a system, characterizing failures, gaining insights into the progression of security attacks, designing mitigation means and countermeasures.

Academia and industry widely recognize the inherent potential of reliability and security data analysis for assessing dependability of computer systems and operational networks, and improving the engineering process. Data analysis in these specific areas poses many challenging research questions due to the heterogeneity, volume and velocity of the collected data, the lack of systematic end-to-end analysis procedures, the increasing diversity of analysis objectives and emerging application domains in critical areas.

RSDA addresses, but it is not limited to, the following research issues/topics:

  • Dependability and security measurement and modeling;
  • Dependability and security monitoring and control;
  • Analysis of attacks, defenses, and countermeasures;
  • Intrusion detection and prevention;
  • Denial-of-Service and botnet analysis, detection, and mitigation;
  • Application security status monitoring;
  • Behavior-based fraud and threat detection;
  • Insider threat and functional misuse detection;
  • Error/Failure detection and characterization;
  • Failure prediction and recovery techniques;
  • Failure data analysis and field studies;
  • Fault and intrusion tolerance;
  • Dependability and security forensics;
  • Generation of synthetic data sets for benchmarking dependability/security techniques;
  • Dependability and security analysis techniques for large datasets;
  • Dependability and security analysis of production systems.

Relevant application areas include, but are not limited to:

  • Application dependability and security;
  • Distributed, parallel, clustered and grid systems;
  • Critical infrastructures protection;
  • Cloud;
  • Mobile systems and services;
  • Database and transactional systems;
  • Operating systems;
  • Web-based information systems.