Full Disclosure mailing list archives

Last week to submit: ICIMP 2010 || May 9-15, 2010 - Barcelona, Spain


From: Jaime Lloret Mauri<jlloret () dcom upv es>
Date: Thu, 17 Dec 2009 00:41:49 +0100


INVITATION:

=================

Note that we are entering the last week of submissions.

Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and 
publish original scientific results.

=================


============== ICIMP 2010 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection

May 9-15, 2010 - Barcelona, Spain 


General page: http://www.iaria.org/conferences2010/ICIMP10.html

Call for Papers: http://www.iaria.org/conferences2010/CfPICIMP10.html


Submission deadline: December 20, 2009


Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Publisher: CPS ( see: http://www2.computer.org/portal/web/cscps )

Archived: IEEE CSDL (Computer Science Digital Library) and IEEE Xplore

Submitted for indexing: Elsevier's EI Compendex Database, EI's Engineering Information Index

Other indexes are being considered: INSPEC, DBLP, Thomson Reuters Conference Proceedings Citation Index 


Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, 
implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, 
topic areas. 

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html
 

ICIMP 2010 Tracks (tracks' topics and submission details: see CfP on the site)

TRASI: Internet traffic surveillance and interception

    Methods and context to classify legal and illegal traffic; Methods and procedure to classify wanted and undesired 
traffic; Overloads, attacks, and failures; Detection of attacks via protocols and applications; Undesired traffic 
evaluation; Traffic identification caused by malicious code (spam, virii, and worms, etc.); Traffic profile during 
disaster recovery; Traffic during active emergency services; Early warning on growing undesired traffic; Access control 
and audit detection points; Denial of service; Spoofing; Lawful interception; Multi-modal undesired traffic detection; 
Measurements and data mining correlation; Countermeasures on undesired traffic

IPERF: Internet performance

    Performance-oriented design; Active and passive performance monitoring; Performance metrics and measurements; 
Measurement-based performance evaluation in Internet; System measurement and monitoring; Performance model verification 
and validation; Stochastic modeling (queues,  Petri nets, etc.); Statistical performance; Performance of Internet 
routing; Performance optimization; Internet performance prediction; Internet performance evaluation studies; Internet 
performance testbeds; Performance evaluation of Web search engines; Performance evaluation of P2P systems

RTSEC: Security for Internet-based real-time systems

    Security and availability of Web Services; Security/Performance trade-off; Distributed systems security; 
Language-based security; Formalisms for security and protocol verification; Performance on firewall protected real-time 
systems; Security management in real-time systems; Metrics and techniques for security risk assessment; Internet 
monitoring and response security service; Protecting emergency communications from misuse and exploitation; Maintaining 
security in the face of disaster; Intrusion prevention and detection systems; Secure networks from web-based threats

DISAS: Disaster prevention and recovery

    Survivable networks on chips; Intrusion detection and defense; Alerting systems based on outstanding network 
events; Recovery methods in various networks; Disaster diagnosis and continuity plans; Fighting mechanisms for disaster 
of networks and applications; Global positioning systems; Vehicle localization and navigation systems; Disaster relief 
agencies to perform recovery operations; Survivability-driven defense and do-it-yourself disaster recovery; Security 
during disaster recovery; Budgeting disaster recovery; Networks emergency services; Reliable emergency communications 
and applications; Response to the networks emergency services; Disaster prevention and recovery; Fighting mechanisms 
for disaster of networks and applications; Networks resiliency methods; Recovery in various networks; Theory on robust 
networks; Customer protection and serviceability perception; Cost models and business impact; Cultural and legal 
aspects; Future advanced network development and evol!
 ution; Standards and guidelines; La
wful interception and defense strategies; Security issues with emergency services and disaster recovery

EMERG: Networks and applications emergency services

    Survivability architecture for e-commerce; Emergency and non-emergency services; Emergency coverage and 
intermittent services; PSAPs and emergency services; Future 911 PSAP message interfaces; Reliable emergency 
communications; Next generation of emergency communications; Response to the networks emergency services; Voice 
emergency notification services

MONIT: End-to-end sampling, measurement, and monitoring

    Internet monitoring techniques and procedures; Monitoring tools, functions, and metrics; Combining, filtering, and 
reporting monitoring metrics; Theory and practice on sampling/inversion problem (accuracy, complexity, etc.); 
Distributed and adaptive sampling techniques; Sampling & inverting traffic with passive and active systems; Internet 
end-to-end measurements from a sampling perspective; Impact of sampling on anomaly detection; Mechanisms for sampling 
the Internet traffic or collected traces; On-line and off-line metrics and measurements; Incident estimation and 
monitoring; Internet access monitoring; Spy software; Internet monitoring, filtering and blocking software; Monitoring 
Internet traffic to optimize network bandwidth; Remote monitoring

REPORT: Experiences & lessons learnt in securing networks and applications

    Platforms for electronic distribution of plane tickets; Platforms for electronic distribution of hotel booking; 
Data accuracy; E-trade strengths and weaknesses; Malicious spyware; Blocking without quarantining the systems/networks; 
Out-of-band intrusion prevention; Antivirus e-mail gateways software; Security and vulnerability engineering

USSAF: User safety, privacy, and protection over Internet

    Countermeasures on fraud prevention; Trust, trust estimators, and trust mitigation in public e-business; Customer 
protection and serviceability perception; Privacy impacts of emergency presence services; Authentication/authorization; 
Biometric methodologies and ID Cards; Security on hardware and smart cards; Identity management; Automated security 
analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; 
Presence protocols; Priority user service

SYVUL: Systems vulnerabilities

    Vulnerability specification languages; System vulnerability assessment; Formal methods for safety-critical systems; 
Prediction capabilities of vulnerability discovery models; Highly vulnerable systems; Critical vulnerabilities; Errors 
and configurations leading to vulnerabilities; Incident reports and handling; Networks resiliency methods; Capacity 
planning for resilience and emergency; Operational resilience; Theory of disaster-tolerant systems; Web service 
vulnerability; Protocol vulnerability; Vulnerabilities in database systems; Vulnerability in control systems; 
Vulnerability analysis and. requirements for the security; Vulnerabilities by self-managed sensors; Recovery by 
disruption resource procedures; Common vulnerability scoring systems; Cost models and vulnerability business impact

SYDIA: Systems diagnosis

    Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; Process algebras for systems diagnosis; 
Probabilistic diagnosis of multiprocessor systems; Self-diagnosis in distributed systems; Cognitive system diagnosis; 
System diagnosis using propagation models; Technical intuition in systems diagnosis; Managing conflicts in systems 
diagnosis; Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; Remote system diagnosis; Diagnosis 
licensing; Real-time symptom detection and fixing actions; Forensic/real-time/anticipative diagnosis; Diagnosing 
mobility-oriented systems; Diagnosis of discrete event systems; Diagnosis of complex dynamical systems

CYBER-FRAUD: Cyber fraud

    Epidemiological models for warware and cyber-crime propagation; Record and retrieval of cyber-crimes; Forensic 
analysis; Cyber-crime prevention; Cyber-crime vulnerabilities; Cyber-counterattack at source; Distributed 
cyber-attacks; Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Spyware and malware; Cyber-pranks, 
hoaxes; Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime reporting; Accuracy and security of 
cyber-reports; Fighting cyber-crimes; Cyber-crime laws

BUSINESS: Business continuity

    Regulatory compliance; Techniques for business continuity planning in the real world; Business contingency and 
resumption planning; Emotional continuity management; Semiotic engineering of online services; Emergency preparedness 
for industry and commerce; Updating, auditing and testing plans; Reduce downtime with continuous backup; Global 
connectivity and international formats; Web-based planning tools; Automatic high speed notification and response for 
business continuity; Centralized management; Businesses continuity planning software; On-demand business transformation

RISK: Risk assessment

    Risk assessment information systems; Modeling risk assessment; Risk Assessment methods; Global risk assessment; 
Qualitative risk assessments; Quantitative risk assessment; Challenges in risk assessment; Risk assessment for economy; 
Risk assessment for security of communications systems; Safety risk assessment; Health system risk assessment; 
Integrated risk assessment; Planning tools for proactive risk assessment; Risk management; Risk factors and economic 
impact; Risk metrics and calibration; Precaution and risk balance; Risk and economic analysis of terrorism events; Risk 
analysis for extreme events; Life cycle assessment in decision making; Environmental risk assessment; Credit ratings 
risk assessment; Risk Assessment statistics & numerical data; Risk assessment standards; Risk assessment tools and 
support software

TRUST: Privacy and trust in pervasive communications

    Trust development and management; Engineering requirements for trust management; Formalisms for trust 
specification, verification and validation; Logics for the analysis of trust and for reasoning about trust; Legal 
framework for online trust environments; Trust in semantic Web services; Reputation systems; Distributed trust 
management; Trust on anonymous documents; Privacy and trust; Trust in collaborative work and risk assessment; Risk 
analysis to assess user trust; Human behaviors in trusted environments; Trust in virtual communities; Trust mediation 
in knowledge management; Trust planning and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; 
Identity Management in pervasive environments (requirements, levels of abstractions, context, protection, etc.); 
Assurance (compliance, assurance, audit, security requirements)

RIGHT: Digital rights management

    Ontology and frameworks on digital rights management; Digital rights property languages; Semantic and encoding of 
digital rights; Rights granularity; Digital right technologies; Digital rights management schemes; Federated digital 
rights management; Distributed digital rights management; Copyright protection schemes; Digital rights management ands 
social norms; Faire use, innovation, and competition; Trading fair use for digital rights management; Digital rights 
management and open access; Privacy engineering for digital rights management; Value-centered design for digital rights 
management; Free software and digital rights management; P2P and digital rights management; Broadband/IPTV content 
protection and digital rights management; Digital right management and content licensing; Digital rights management 
issues in real-time and safety/mission systems; RFID tags for digital rights management; Digital rights management in 
learning systems; Legal policy and digital right !
 management

BIOTEC: Biometric techniques

    Models and techniques for biometric technologies; Finger, facial, iris, voice, and skin biometrics; Biometric 
security; Signature recognition; Multimodal biometrics; Verification and identification techniques; Accuracy of 
biometric technologies; Authentication smart cards and biometric metrics; Performance and assurance testing; 
Limitations of biometric technologies; Biometric card technologies; Biometric wireless technologies; Biometric software 
and hardware; Biometric standards

EMDRM: Enterprise & Media DRM

    Digital Policy Management; Enterprise Rights Management (adoption and case studies); DRM Interoperability; 
Operational Risk Management; Compliance and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); Corporate Governance; 
Content and Knowledge Management (financial, CAD, IP, trade secrets, etc.); Interorganizational System (IOS); Retention 
Policies and Classification; Traceability, Monitoring, tracking, usage metering, audit trails



==========

ICIMP Advisory Chairs

Petre Dini, IARIA / Concordia University, Canada

Go Hasegawa, Osaka University, Japan

Seppo Heikkinen, Tampere University of Technology, Finland

Jaime Lloret Mauri, Polytechnic University of Valencia, Spain

Igor Podebrad, Commerzbank, Germany

Chi Zhang, Juniper Networks, USA


ICIMP 2010 Publicity Chair

Guillaume Valadon, Université Pierre et Marie Curie, France 


Committee members: http://www.iaria.org/conferences2010/ComICIMP10.html

====================

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: