Quantitative Risk Analysis for Security Applications (QRASA) Workshop

At IJCAI 2009 in Pasadena, California (July 11-17, 2009)

Saturday, July 11, 2009

The proceedings are available as a single pdf file here, or the papers can be downloaded separately using the links below.

Instructions for Presenters

All participants should register for the workshop through the IJCAI website.

The workshop schedule is posted below. Each paper accepted to the workshop will be presented by one of the authors. Authors should prepare for a 15-minute presentation, followed by 5 minutes of questions and discussion about the work. We have reserved time at the end of the workshop for general group discussion.

Workshop Schedule

9:00 - 9:20 Strategic Modeling of Information Sharing among Data Privacy Attackers (Quang Duong, Kristen LeFevre and Michael P. Wellman)
9:20 - 9:40 Decision Analysis by Proxy for the Rational Terrorist (Heather Rosoff and Richard John)
9:40 - 10:00 Strategic Security Placement in Network Domains with Applications to Transit Security (Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe)
10:00 - 10:30 Coffee Break
10:30 - 10:50 Uncertainties in Adversarial Patrol (Noa Agmon, Sarit Kraus and Gal A. Kaminka)
10:50 - 11:10 Is There a Chink in York ARMOR: Towards Robust Evaluations for Deployed Security System (Matthew E. Taylor, Christopher Kiekintveld, Craig Western, and Milind Tambe)
11:10 - 12:10 Panel Discussion
12:10 - 1:40 Lunch
1:40 - 2:00 Application of Microsimulation to the Modelling of Terrorist Attacks (Ian Piper, Daniel Keep, Tony Green, Ivy Zhang)
2:00 - 2:20 Planning to Discover and Counteract Attacks (Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Orosz, Robert T. Neches)
2:20 - 2:40 Intelligent Risk Analysis in Access Control (Bostjan Kaluza, Erik Dovgan, Tea Tusar, Matjaz Gams)
2:40 - 3:00 Applying a Novel Scheme in Risk Assessment for Port State Control Inspection (Zhong Gao, Huike Li, Guanming Lu and Daquan Gu)
3:00 - 3:30 Coffee Break
3:30 - 3:50 Challenges of Distributed Intelligent Surveillance System with Heterogenous Information (Weiru Liu, Paul Miller, Jianbing Ma, Weiqi Yan)
3:50 - 5:00 Group Discussion

Workshop Description

Security domains present a wide array of research challenges for the artificial intelligence community. These applications require methods for predicting, mitigating, and reacting to intentional threats by adversarial agents, often under significant uncertainty. Deploying agent and multi-agent technologies to meet these challenges is a high-impact area for growth in our community. Security challenges are increasingly important in today's world, and arise in diverse settings. Examples include security patrols for protecting critical infrastructure, random screenings and checkpoints of baggage and persons, and network administrators monitoring IT systems for vulnerabilities and breaches. The purpose of this workshop is to bring together researchers in the field of risk analysis and security to discuss promising ways to leverage quantitative methods and algorithms in real-world security domains.


The areas of interest include, but are not limited to:


We solicit participation from all members of the AI community with interest in security applications, including both academic and industry participants. We plan to accept 10-12 full papers from the pool of submissions, but may consider including poster presentation in the event that many suitable papers are submitted. The number of participants is limited, and participants associated with submitted papers will be given preference. However, we also hope to be able to accomodate participants that do not have accepted papers. At least one author of each submitted paper must attend the workshop to present the work. The IJCAI registration site can be found here.

Submission Requirements

Submitted papers are limited to 8 pages and must be in pdf format, following the guidelines of the main IJCAI conference. Shorter submission will also be considered. Formatting guidelines and Latex style files are available here.

Papers will be reviewed by the program committee using a single-blind review process. Reviewers will be instructed to rate papers based on their novelty, importance, relevance to the workshop and technical merit. Since this workshop is meant as a forum to discuss novel work with peers, preliminary work that appears very promising will also be considered for acceptance. We will also encourage papers that help chart out the landscape of existing approaches, and explain how these relate to each other.

Important dates: Papers should be submitted via email attachment to kiekintv@usc.edu no later than midnight EST on April 3, 2009.

Organizing Committee and Contact Information

Janusz Marecki
IBM Research
Address: IBM T.J. Watson Research Center
Phone: 914-945-1024
Email: janusz.marecki@gmail.com

Praveen Paruchuri
Carnegie Mellon University
Email: paruchur@gmail.com

Christopher Kiekintveld
University of Southern California
Email: kiekintv@usc.edu

Katia Sycara
Carnegie Mellon Univiersity
Email: katia@cs.cmu.edu

Program Committee

Alon Altman Stanford University
Elisa Bertino Purdue University
Doran Chatraborty University of Texas
Pau-chen Cheng IBM Research
John Clark University of York
Tinglong Dai Carnegie Mellon University
Simon Foley University College Cork
Nicola Gatti Politecnico di Milando
Andrew Gilpin Carnegie Mellon University
Rachel Greenstadt Drexel University
Patrick Jordan University of Michigan
Andreas Krause California Institute of Technology
Mirek Kordos Silesian Institute of Technology
Ning-Hui Li Purdue University
Rajiv Maheswaran Information Sciences Institute
Jon Oberheide University of Michigan
James Pita University of Southern California
Zinovi Rabinovich University of Southampton
Bonnie Ray IBM Research
Mudhakar Srivatsa IBM Research
Matthew Taylor University of Southern California
Pradeep Varakantham Carnegie Mellon University
Yevgeniy Vorobeychik University of Pennsylvania
Rick Wash University of Michigan
Roie Zivan Carnegie Mellon University