=================
Please consider to contribute to and/or forward to the appropriate groups
the following opportunity to submit and publish original scientific
results.
=================
============== ICIMP 2010 | Call for Papers ===============
CALL FOR PAPERS, TUTORIALS, PANELS
ICIMP 2010: The Fifth International Conference on Internet Monitoring and
Protection
May 9-15, 2010 - Barcelona, Spain
General page: http://www.iaria.org/conferences2010/ICIMP10.html
Call for Papers: http://www.iaria.org/conferences2010/CfPICIMP10.html
Submission deadline: December 10, 2009
Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals:
http://www.iariajournals.org
Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )
Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore
Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering
Information Index
Other indexes are being considered: INSPEC, DBLP, Thomson Reuters
Conference Proceedings Citation Index
Please note the Poster Forum and Work in Progress options.
The topics suggested by the conference can be discussed in term of
concepts, state of the art, research, standards, implementations, running
experiments, applications, and industrial case studies. Authors are
invited to submit complete unpublished papers, which are not under review
in any other conference or journal in the following, but not limited to,
topic areas.
All tracks are open to both research and industry contributions, in terms
of Regular papers, Posters, Work in progress, Technical/marketing/business
presentations, Demos, Tutorials, and Panels.
Before submission, please check and conform with the Editorial rules:
http://www.iaria.org/editorialrules.html
ICIMP 2010 Tracks (tracks' topics and submission details: see CfP on the
site)
TRASI: Internet traffic surveillance and interception
Methods and context to classify legal and illegal traffic; Methods and
procedure to classify wanted and undesired traffic; Overloads, attacks,
and failures; Detection of attacks via protocols and applications;
Undesired traffic evaluation; Traffic identification caused by malicious
code (spam, virii, and worms, etc.); Traffic profile during disaster
recovery; Traffic during active emergency services; Early warning on
growing undesired traffic; Access control and audit detection points;
Denial of service; Spoofing; Lawful interception; Multi-modal undesired
traffic detection; Measurements and data mining correlation;
Countermeasures on undesired traffic
IPERF: Internet performance
Performance-oriented design; Active and passive performance monitoring;
Performance metrics and measurements; Measurement-based performance
evaluation in Internet; System measurement and monitoring; Performance
model verification and validation; Stochastic modeling (queues, Petri
nets, etc.); Statistical performance; Performance of Internet routing;
Performance optimization; Internet performance prediction; Internet
performance evaluation studies; Internet performance testbeds; Performance
evaluation of Web search engines; Performance evaluation of P2P systems
RTSEC: Security for Internet-based real-time systems
Security and availability of Web Services; Security/Performance trade-off;
Distributed systems security; Language-based security; Formalisms for
security and protocol verification; Performance on firewall protected
real-time systems; Security management in real-time systems; Metrics and
techniques for security risk assessment; Internet monitoring and response
security service; Protecting emergency communications from misuse and
exploitation; Maintaining security in the face of disaster; Intrusion
prevention and detection systems; Secure networks from web-based threats
DISAS: Disaster prevention and recovery
Survivable networks on chips; Intrusion detection and defense; Alerting
systems based on outstanding network events; Recovery methods in various
networks; Disaster diagnosis and continuity plans; Fighting mechanisms for
disaster of networks and applications; Global positioning systems; Vehicle
localization and navigation systems; Disaster relief agencies to perform
recovery operations; Survivability-driven defense and do-it-yourself
disaster recovery; Security during disaster recovery; Budgeting disaster
recovery; Networks emergency services; Reliable emergency communications
and applications; Response to the networks emergency services; Disaster
prevention and recovery; Fighting mechanisms for disaster of networks and
applications; Networks resiliency methods; Recovery in various networks;
Theory on robust networks; Customer protection and serviceability
perception; Cost models and business impact; Cultural and legal aspects;
Future advanced network development and evolution; Standards and
guidelines; Lawful interception and defense strategies; Security issues
with emergency services and disaster recovery
EMERG: Networks and applications emergency services
Survivability architecture for e-commerce; Emergency and non-emergency
services; Emergency coverage and intermittent services; PSAPs and
emergency services; Future 911 PSAP message interfaces; Reliable emergency
communications; Next generation of emergency communications; Response to
the networks emergency services; Voice emergency notification services
MONIT: End-to-end sampling, measurement, and monitoring
Internet monitoring techniques and procedures; Monitoring tools,
functions, and metrics; Combining, filtering, and reporting monitoring
metrics; Theory and practice on sampling/inversion problem (accuracy,
complexity, etc.); Distributed and adaptive sampling techniques; Sampling
& inverting traffic with passive and active systems; Internet end-to-end
measurements from a sampling perspective; Impact of sampling on anomaly
detection; Mechanisms for sampling the Internet traffic or collected
traces; On-line and off-line metrics and measurements; Incident estimation
and monitoring; Internet access monitoring; Spy software; Internet
monitoring, filtering and blocking software; Monitoring Internet traffic
to optimize network bandwidth; Remote monitoring
REPORT: Experiences & lessons learnt in securing networks and applications
Platforms for electronic distribution of plane tickets; Platforms for
electronic distribution of hotel booking; Data accuracy; E-trade strengths
and weaknesses; Malicious spyware; Blocking without quarantining the
systems/networks; Out-of-band intrusion prevention; Antivirus e-mail
gateways software; Security and vulnerability engineering
USSAF: User safety, privacy, and protection over Internet
Countermeasures on fraud prevention; Trust, trust estimators, and trust
mitigation in public e-business; Customer protection and serviceability
perception; Privacy impacts of emergency presence services;
Authentication/authorization; Biometric methodologies and ID Cards;
Security on hardware and smart cards; Identity management; Automated
security analysis; Electronic Privacy; Anonymity and pseudo-anonymity;
Security compliance; Public safety, Instance messages; Presence protocols;
Priority user service
SYVUL: Systems vulnerabilities
Vulnerability specification languages; System vulnerability assessment;
Formal methods for safety-critical systems; Prediction capabilities of
vulnerability discovery models; Highly vulnerable systems; Critical
vulnerabilities; Errors and configurations leading to vulnerabilities;
Incident reports and handling; Networks resiliency methods; Capacity
planning for resilience and emergency; Operational resilience; Theory of
disaster-tolerant systems; Web service vulnerability; Protocol
vulnerability; Vulnerabilities in database systems; Vulnerability in
control systems; Vulnerability analysis and. requirements for the
security; Vulnerabilities by self-managed sensors; Recovery by disruption
resource procedures; Common vulnerability scoring systems; Cost models and
vulnerability business impact
SYDIA: Systems diagnosis
Diagnosis platforms; Diagnosis policy language; Diagnosis event formats;
Process algebras for systems diagnosis; Probabilistic diagnosis of
multiprocessor systems; Self-diagnosis in distributed systems; Cognitive
system diagnosis; System diagnosis using propagation models; Technical
intuition in systems diagnosis; Managing conflicts in systems diagnosis;
Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; Remote
system diagnosis; Diagnosis licensing; Real-time symptom detection and
fixing actions; Forensic/real-time/anticipative diagnosis; Diagnosing
mobility-oriented systems; Diagnosis of discrete event systems; Diagnosis
of complex dynamical systems
CYBER-FRAUD: Cyber fraud
Epidemiological models for warware and cyber-crime propagation; Record and
retrieval of cyber-crimes; Forensic analysis; Cyber-crime prevention;
Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed
cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm
attacks; Spyware and malware; Cyber-pranks, hoaxes; Phishing/Pharming and
anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and
security of cyber-reports; Fighting cyber-crimes; Cyber-crime laws
BUSINESS: Business continuity
Regulatory compliance; Techniques for business continuity planning in the
real world; Business contingency and resumption planning; Emotional
continuity management; Semiotic engineering of online services; Emergency
preparedness for industry and commerce; Updating, auditing and testing
plans; Reduce downtime with continuous backup; Global connectivity and
international formats; Web-based planning tools; Automatic high speed
notification and response for business continuity; Centralized management;
Businesses continuity planning software; On-demand business transformation
RISK: Risk assessment
Risk assessment information systems; Modeling risk assessment; Risk
Assessment methods; Global risk assessment; Qualitative risk assessments;
Quantitative risk assessment; Challenges in risk assessment; Risk
assessment for economy; Risk assessment for security of communications
systems; Safety risk assessment; Health system risk assessment; Integrated
risk assessment; Planning tools for proactive risk assessment; Risk
management; Risk factors and economic impact; Risk metrics and
calibration; Precaution and risk balance; Risk and economic analysis of
terrorism events; Risk analysis for extreme events; Life cycle assessment
in decision making; Environmental risk assessment; Credit ratings risk
assessment; Risk Assessment statistics & numerical data; Risk assessment
standards; Risk assessment tools and support software
TRUST: Privacy and trust in pervasive communications
Trust development and management; Engineering requirements for trust
management; Formalisms for trust specification, verification and
validation; Logics for the analysis of trust and for reasoning about
trust; Legal framework for online trust environments; Trust in semantic
Web services; Reputation systems; Distributed trust management; Trust on
anonymous documents; Privacy and trust; Trust in collaborative work and
risk assessment; Risk analysis to assess user trust; Human behaviors in
trusted environments; Trust in virtual communities; Trust mediation in
knowledge management; Trust planning and evaluation metrics; Trust
policies; Self-adaptable trust mechanisms; Identity Management in
pervasive environments (requirements, levels of abstractions, context,
protection, etc.); Assurance (compliance, assurance, audit, security
requirements)
RIGHT: Digital rights management
Ontology and frameworks on digital rights management; Digital rights
property languages; Semantic and encoding of digital rights; Rights
granularity; Digital right technologies; Digital rights management
schemes; Federated digital rights management; Distributed digital rights
management; Copyright protection schemes; Digital rights management ands
social norms; Faire use, innovation, and competition; Trading fair use for
digital rights management; Digital rights management and open access;
Privacy engineering for digital rights management; Value-centered design
for digital rights management; Free software and digital rights
management; P2P and digital rights management; Broadband/IPTV content
protection and digital rights management; Digital right management and
content licensing; Digital rights management issues in real-time and
safety/mission systems; RFID tags for digital rights management; Digital
rights management in learning systems; Legal policy and digital right
management
BIOTEC: Biometric techniques
Models and techniques for biometric technologies; Finger, facial, iris,
voice, and skin biometrics; Biometric security; Signature recognition;
Multimodal biometrics; Verification and identification techniques;
Accuracy of biometric technologies; Authentication smart cards and
biometric metrics; Performance and assurance testing; Limitations of
biometric technologies; Biometric card technologies; Biometric wireless
technologies; Biometric software and hardware; Biometric standards
EMDRM: Enterprise & Media DRM
Digital Policy Management; Enterprise Rights Management (adoption and case
studies); DRM Interoperability; Operational Risk Management; Compliance
and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate
Governance; Content and Knowledge Management (financial, CAD, IP, trade
secrets, etc.); Interorganizational System (IOS); Retention Policies and
Classification; Traceability, Monitoring, tracking, usage metering, audit
trails
==========
ICIMP Advisory Chairs
Petre Dini, IARIA / Concordia University, Canada
Go Hasegawa, Osaka University, Japan
Seppo Heikkinen, Tampere University of Technology, Finland
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Igor Podebrad, Commerzbank, Germany
Chi Zhang, Juniper Networks, USA
ICIMP 2010 Publicity Chair
Guillaume Valadon, Université Pierre et Marie Curie, France
Committee members: http://www.iaria.org/conferences2010/ComICIMP10.html
====================
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment