TU BRAUNSCHWEIG

Community Services — Konrad Rieck

Academic Memberships

  • Editorial board of the Journal of Machine Learning Research (JMLR
  • Guest editor of the special issue "Vulnerability Analysis" in Information Technology
  • Guest editor of the special issue "Threat Detection, Analysis and Defense" in JISA
  • Steering committee of the GI SIG Intrusion Detection and Response (SIDAR
  • Steering committee of the International Conference on Detection of Intrusions and Malware (DIMVA
  • Scientific Advisory Board "IT Security" of Volkswagen AutoUni
  • Jury of the CAST/GI Dissertation Award IT-Security
  • Jury of the Dutch Cyber Security Research Paper Award
  • Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. (FIfF)
  • German Informatics Society (GI)

Conference and Workshop Organisation

  • Program co-chair of the 11th European Workshop on Systems Security (EUROSEC'18)
  • Program chair of the 10th International Conference on Detection of Intrusions and Malware (DIMVA'13)
  • General chair of the 6th European Conference on Computer Network Defense (EC2ND'10)
  • Local organization of the GI Workshop on Reactive Security (SPRING'06)

Program Committee Memberships

2018

  • International Conference on Distributed Computing Systems (ICDCS); Security Track
  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • ACM Asia Conference on Computer and Communications Security (ASIACCS)
  • ACM Symposium on Applied Computing (SAC)
  • Workshop on Context Systems Design, Evaluation and Optimization (COSDEO)
  • European Workshop on Systems Security (EUROSEC)

2017

  • Annual Computer Security Applications Conference (ACSAC)
  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • ACM Asia Conference on Computer and Communications Security (ASIACCS)
  • ACM Symposium on Applied Computing (SAC)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)
  • European Workshop on Systems Security (EUROSEC)
  • Workshop on Learning from Authoritative Security Experiment Results (LASER)
  • Reversing and Offensive-Oriented Trends Symposium (ROOTS)

2016

  • ACM Conference on Computer and Communications Security (CCS)
  • Annual Computer Security Applications Conference (ACSAC)
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
  • IEEE European Symposium on Security and Privacy (EUROS&P)
  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • IFIP Information Security and Privacy Conference (SEC)
  • GI Conference "Sicherheit – Schutz und Zuverlässigkeit" (SICHERHEIT)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)
  • European Workshop on Systems Security (EUROSEC)

2015

  • ACM Conference on Computer and Communications Security (CCS)
  • Annual Computer Security Applications Conference (ACSAC)
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • International World Wide Web Conference (WWW); Security Track
  • International Symposium on Engineering Secure Software and Systems (ESSOS)
  • IEEE Conference on Embedded and Ubiquitous Computing (EUC); Security Track
  • IFIP Information Security and Privacy Conference (SEC)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)
  • European Workshop on Systems Security (EUROSEC)
  • ICML Workshop on Machine Learning Open Source Software (MLOSS)
  • Workshop on Privacy and Inference (PRINF)

2014

  • ACM Conference on Computer and Communications Security (CCS)
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • IEEE Conference on Embedded and Ubiquitous Computing (EUC); Security Track
  • International Conference on Availability, Reliability and Security (ARES)
  • Symposium on Electronic Crime Research (ECRIME)
  • GI Conference "Sicherheit – Schutz und Zuverlässigkeit" (SICHERHEIT)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)
  • European Workshop on Systems Security (EUROSEC)
  • ICML Workshop on Learning, Security and Privacy (LSP)

2013

  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • International Conference on Availability, Reliability and Security (ARES)
  • International Conference on Privacy, Security and Trust (PST)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)
  • NIPS Workshop on Machine Learning Open Source Software (MLOSS)
  • GI Workshop on Network Anomaly Detection (NAD)

2012

  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • International Conference on Availability, Reliability and Security (ARES)
  • International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)

2011

  • International Conference on Detection of Intrusions and Malware (DIMVA)
  • European Conference on Network Defense (EC2ND)
  • International Joint Conferences on Artificial Intelligence (IJCAI)
  • ACM Workshop on Artificial Intelligence and Security (AISEC)

2010

  • European Conference on Network Defense (EC2ND)
  • ICML Workshop on Machine Learning Open Source Software (MLOSS)
  • GI Conference "Sicherheit – Schutz und Zuverlässigkeit" (SICHERHEIT)

2009

  • International Conference on Detection of Intrusions and Malware (DIMVA)

Reviewing Statistics

review stats

review stats

Reviewing for Journals

Computer Security

  • ACM Computing Surveys (CSUR)
  • ACM Transactions on Privacy and Security (TOPS)
  • previously ACM Transactions on Information and System Security (TISSEC)
  • Journal of Computer Security (JCS)
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • International Journal of Information Security (IJIS)
  • Security and Communication Networks (SCN)

Machine Learning

  • Journal of Machine Learning Research (JMLR)
  • Data Mining and Knowledge Discovery (DMKD)
  • Information Fusion (INFFUS)
  • Computer Journal (CJ)

  aktualisiert am 03.12.2017
TU_Icon_E_Mail_1_17x17_RGB Zum Seitenanfang