[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart, Germany
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] 2nd CfP: ICIMP 2012 || May 27 - June 1, 2012 - Stuttgart, Germany
- From: Cristina Pascual<cris.pascual.gonzalez@xxxxxxxxx>
- Date: Thu, 6 Oct 2011 16:45:25 +0200
INVITATION:
=================
Please, consider to contribute to and/or forward to the appropriate groups the
following opportunity to submit and publish original scientific results to
ICIMP 2012.
The submission deadline is set to January 5, 2012.
In addition, authors of selected papers will be invited to submit extended
article versions to one of the IARIA Journals: http://www.iariajournals.org
=================
============== ICIMP 2012 | Call for Papers ===============
CALL FOR PAPERS, TUTORIALS, PANELS
ICIMP 2012, The Seventh International Conference on Internet Monitoring and
Protection
May 27 - June 1, 2012 - Stuttgart, Germany
General page: http://www.iaria.org/conferences2012/ICIMP12.html
Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html
- regular papers
- short papers (work in progress)
- posters
- ideas
Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html
Submission deadline: January 5, 2012
Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals:
http://www.iariajournals.org
Please note the Poster and Work in Progress options.
The topics suggested by the conference can be discussed in term of concepts,
state of the art, research, standards, implementations, running experiments,
applications, and industrial case studies. Authors are invited to submit
complete unpublished papers, which are not under review in any other conference
or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of
Regular papers, Posters, Work in progress, Technical/marketing/business
presentations, Demos, Tutorials, and Panels.
Before submission, please check and conform with the Editorial rules:
http://www.iaria.org/editorialrules.html
ICIMP 2012 Topics (topics and submission details: see CfP on the site)
TRASI: Internet traffic surveillance and interception
Methods and context to classify legal and illegal traffic; Methods and
procedure to classify wanted and undesired traffic; Overloads, attacks, and
failures; Detection of attacks via protocols and applications; Undesired
traffic evaluation; Traffic identification caused by malicious code (spam,
virii, and worms, etc.); Traffic profile during disaster recovery; Traffic
during active emergency services; Early warning on growing undesired traffic;
Access control and audit detection points; Denial of service; Spoofing; Lawful
interception; Multi-modal undesired traffic detection; Measurements and data
mining correlation; Countermeasures on undesired traffic
IPERF: Internet performance
Performance-oriented design; Active and passive performance monitoring;
Performance metrics and measurements; Measurement-based performance evaluation
in Internet; System measurement and monitoring; Performance model verification
and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical
performance; Performance of Internet routing; Performance optimization;
Internet performance prediction; Internet performance evaluation studies;
Internet performance testbeds; Performance evaluation of Web search engines;
Performance evaluation of P2P systems
RTSEC: Security for Internet-based real-time systems
Security and availability of Web Services; Security/Performance trade-off;
Distributed systems security; Language-based security; Formalisms for security
and protocol verification; Performance on firewall protected real-time systems;
Security management in real-time systems; Metrics and techniques for security
risk assessment; Internet monitoring and response security service; Protecting
emergency communications from misuse and exploitation; Maintaining security in
the face of disaster; Intrusion prevention and detection systems; Secure
networks from web-based threats
DISAS: Disaster prevention and recovery
Survivable networks on chips; Intrusion detection and defense; Alerting systems
based on outstanding network events; Recovery methods in various networks;
Disaster diagnosis and continuity plans; Fighting mechanisms for disaster of
networks and applications; Global positioning systems; Vehicle localization and
navigation systems; Disaster relief agencies to perform recovery operations;
Survivability-driven defense and do-it-yourself disaster recovery; Security
during disaster recovery; Budgeting disaster recovery; Networks emergency
services; Reliable emergency communications and applications; Response to the
networks emergency services; Disaster prevention and recovery; Fighting
mechanisms for disaster of networks and applications; Networks resiliency
methods; Recovery in various networks; Theory on robust networks; Customer
protection and serviceability perception; Cost models and business impact;
Cultural and legal aspects; Future advanced network development and evolutio!
n; Standards and guidelines; Lawful
interception and defense strategies; Security issues with emergency services
and disaster recovery
EMERG: Networks and applications emergency services
Survivability architecture for e-commerce; Emergency and non-emergency
services; Emergency coverage and intermittent services; PSAPs and emergency
services; Future 911 PSAP message interfaces; Reliable emergency
communications; Next generation of emergency communications; Response to the
networks emergency services; Voice emergency notification services
MONIT: End-to-end sampling, measurement, and monitoring
Internet monitoring techniques and procedures; Monitoring tools, functions, and
metrics; Combining, filtering, and reporting monitoring metrics; Theory and
practice on sampling/inversion problem (accuracy, complexity, etc.);
Distributed and adaptive sampling techniques; Sampling & inverting traffic with
passive and active systems; Internet end-to-end measurements from a sampling
perspective; Impact of sampling on anomaly detection; Mechanisms for sampling
the Internet traffic or collected traces; On-line and off-line metrics and
measurements; Incident estimation and monitoring; Internet access monitoring;
Spy software; Internet monitoring, filtering and blocking software; Monitoring
Internet traffic to optimize network bandwidth; Remote monitoring
REPORT: Experiences & lessons learnt in securing networks and applications
Platforms for electronic distribution of plane tickets; Platforms for
electronic distribution of hotel booking; Data accuracy; E-trade strengths and
weaknesses; Malicious spyware; Blocking without quarantining the
systems/networks; Out-of-band intrusion prevention; Antivirus e-mail gateways
software; Security and vulnerability engineering
USSAF: User safety, privacy, and protection over Internet
Countermeasures on fraud prevention; Trust, trust estimators, and trust
mitigation in public e-business; Customer protection and serviceability
perception; Privacy impacts of emergency presence services;
Authentication/authorization; Biometric methodologies and ID Cards; Security on
hardware and smart cards; Identity management; Automated security analysis;
Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public
safety, Instance messages; Presence protocols; Priority user service
SYVUL: Systems vulnerabilities
Vulnerability specification languages; System vulnerability assessment; Formal
methods for safety-critical systems; Prediction capabilities of vulnerability
discovery models; Highly vulnerable systems; Critical vulnerabilities; Errors
and configurations leading to vulnerabilities; Incident reports and handling;
Networks resiliency methods; Capacity planning for resilience and emergency;
Operational resilience; Theory of disaster-tolerant systems; Web service
vulnerability; Protocol vulnerability; Vulnerabilities in database systems;
Vulnerability in control systems; Vulnerability analysis and. requirements for
the security; Vulnerabilities by self-managed sensors; Recovery by disruption
resource procedures; Common vulnerability scoring systems; Cost models and
vulnerability business impact
SYDIA: Systems diagnosis
Diagnosis platforms; Diagnosis policy language; Diagnosis event formats;
Process algebras for systems diagnosis; Probabilistic diagnosis of
multiprocessor systems; Self-diagnosis in distributed systems; Cognitive system
diagnosis; System diagnosis using propagation models; Technical intuition in
systems diagnosis; Managing conflicts in systems diagnosis; Hybrid systems
diagnosis; Diagnosis tools; End-to-end diagnosis; Remote system diagnosis;
Diagnosis licensing; Real-time symptom detection and fixing actions;
Forensic/real-time/anticipative diagnosis; Diagnosing mobility-oriented
systems; Diagnosis of discrete event systems; Diagnosis of complex dynamical
systems
CYBER-FRAUD: Cyber fraud
Epidemiological models for warware and cyber-crime propagation; Record and
retrieval of cyber-crimes; Forensic analysis; Cyber-crime prevention;
Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed
cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm
attacks; Spyware and malware; Cyber-pranks, hoaxes; Phishing/Pharming and
anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and
security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws
BUSINESS: Business continuity
Regulatory compliance; Techniques for business continuity planning in the real
world; Business contingency and resumption planning; Emotional continuity
management; Semiotic engineering of online services; Emergency preparedness for
industry and commerce; Updating, auditing and testing plans; Reduce downtime
with continuous backup; Global connectivity and international formats;
Web-based planning tools; Automatic high speed notification and response for
business continuity; Centralized management; Businesses continuity planning
software; On-demand business transformation
RISK: Risk assessment
Risk assessment information systems; Modeling risk assessment; Risk Assessment
methods; Global risk assessment; Qualitative risk assessments; Quantitative
risk assessment; Challenges in risk assessment; Risk assessment for economy;
Risk assessment for security of communications systems; Safety risk assessment;
Health system risk assessment; Integrated risk assessment; Planning tools for
proactive risk assessment; Risk management; Risk factors and economic impact;
Risk metrics and calibration; Precaution and risk balance; Risk and economic
analysis of terrorism events; Risk analysis for extreme events; Life cycle
assessment in decision making; Environmental risk assessment; Credit ratings
risk assessment; Risk Assessment statistics & numerical data; Risk assessment
standards; Risk assessment tools and support software
TRUST: Privacy and trust in pervasive communications
Trust development and management; Engineering requirements for trust
management; Formalisms for trust specification, verification and validation;
Logics for the analysis of trust and for reasoning about trust; Legal framework
for online trust environments; Trust in semantic Web services; Reputation
systems; Distributed trust management; Trust on anonymous documents; Privacy
and trust; Trust in collaborative work and risk assessment; Risk analysis to
assess user trust; Human behaviors in trusted environments; Trust in virtual
communities; Trust mediation in knowledge management; Trust planning and
evaluation metrics; Trust policies; Self-adaptable trust mechanisms; Identity
Management in pervasive environments (requirements, levels of abstractions,
context, protection, etc.); Assurance (compliance, assurance, audit, security
requirements)
RIGHT: Digital rights management
Ontology and frameworks on digital rights management; Digital rights property
languages; Semantic and encoding of digital rights; Rights granularity; Digital
right technologies; Digital rights management schemes; Federated digital rights
management; Distributed digital rights management; Copyright protection
schemes; Digital rights management ands social norms; Faire use, innovation,
and competition; Trading fair use for digital rights management; Digital rights
management and open access; Privacy engineering for digital rights management;
Value-centered design for digital rights management; Free software and digital
rights management; P2P and digital rights management; Broadband/IPTV content
protection and digital rights management; Digital right management and content
licensing; Digital rights management issues in real-time and safety/mission
systems; RFID tags for digital rights management; Digital rights management in
learning systems; Legal policy and digital right mana!
gement
BIOTEC: Biometric techniques
Models and techniques for biometric technologies; Finger, facial, iris, voice,
and skin biometrics; Biometric security; Signature recognition; Multimodal
biometrics; Verification and identification techniques; Accuracy of biometric
technologies; Authentication smart cards and biometric metrics; Performance and
assurance testing; Limitations of biometric technologies; Biometric card
technologies; Biometric wireless technologies; Biometric software and hardware;
Biometric standards
EMDRM: Enterprise & Media DRM
Digital Policy Management; Enterprise Rights Management (adoption and case
studies); DRM Interoperability; Operational Risk Management; Compliance and
Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate Governance;
Content and Knowledge Management (financial, CAD, IP, trade secrets, etc.);
Interorganizational System (IOS); Retention Policies and Classification;
Traceability, Monitoring, tracking, usage metering, audit trails
----------------------------------
Technical Program Committee http://www.iaria.org/conferences2012/ComICIMP12.html
====================
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/