INVITATION:

=================
Please, consider to contribute to and/or forward to the appropriate groups the 
following opportunity to submit and publish 
original scientific results to ICIMP 2012.
The submission deadline is extended to January 16, 2012.
In addition, authors of selected papers will be invited to submit extended 
article versions to one of the IARIA Journals: 
http://www.iariajournals.org
=================


============== ICIMP 2012 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

ICIMP 2012, The Seventh International Conference on Internet Monitoring and 
Protection
May 27 - June 1, 2012 - Stuttgart, Germany

General page: http://www.iaria.org/conferences2012/ICIMP12.html

Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html

- regular papers
- short papers (work in progress)
- posters
- ideas


Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html

Submission deadline: January 16, 2012

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: 
http://www.iariajournals.org

Please, note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, 
state of the art, research, standards, 
implementations, running experiments, applications, and industrial case 
studies. Authors are invited to submit complete 
unpublished papers, which are not under review in any other conference or 
journal in the following, but not limited to, 
topic areas.


All tracks are open to both research and industry contributions, in terms of 
Regular papers, Posters, Work in progress, 
Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules: 
http://www.iaria.org/editorialrules.html


ICIMP 2012 Topics (topics and submission details: see CfP on the site)

TRASI: Internet traffic surveillance and interception

   Methods and context to classify legal and illegal traffic; Methods and 
procedure to classify wanted and undesired 
traffic; Overloads, attacks, and failures; Detection of attacks via protocols 
and applications; Undesired traffic 
evaluation; Traffic identification caused by malicious code (spam, virii, and 
worms, etc.); Traffic profile during 
disaster recovery; Traffic during active emergency services; Early warning on 
growing undesired traffic; Access control 
and audit detection points; Denial of service; Spoofing; Lawful interception; 
Multi-modal undesired traffic detection; 
Measurements and data mining correlation; Countermeasures on undesired traffic

IPERF: Internet performance

   Performance-oriented design; Active and passive performance monitoring; 
Performance metrics and measurements; 
Measurement-based performance evaluation in Internet; System measurement and 
monitoring; Performance model verification 
and validation; Stochastic modeling (queues,  Petri nets, etc.); Statistical 
performance; Performance of Internet routing; 
Performance optimization; Internet performance prediction; Internet performance 
evaluation studies; Internet performance 
testbeds; Performance evaluation of Web search engines; Performance evaluation 
of P2P systems

RTSEC: Security for Internet-based real-time systems

   Security and availability of Web Services; Security/Performance trade-off; 
Distributed systems security; Language-based 
security; Formalisms for security and protocol verification; Performance on 
firewall protected real-time systems; Security 
management in real-time systems; Metrics and techniques for security risk 
assessment; Internet monitoring and response 
security service; Protecting emergency communications from misuse and 
exploitation; Maintaining security in the face of 
disaster; Intrusion prevention and detection systems; Secure networks from 
web-based threats

DISAS: Disaster prevention and recovery

   Survivable networks on chips; Intrusion detection and defense; Alerting 
systems based on outstanding network events; 
Recovery methods in various networks; Disaster diagnosis and continuity plans; 
Fighting mechanisms for disaster of 
networks and applications; Global positioning systems; Vehicle localization and 
navigation systems; Disaster relief 
agencies to perform recovery operations; Survivability-driven defense and 
do-it-yourself disaster recovery; Security 
during disaster recovery; Budgeting disaster recovery; Networks emergency 
services; Reliable emergency communications and 
applications; Response to the networks emergency services; Disaster prevention 
and recovery; Fighting mechanisms for 
disaster of networks and applications; Networks resiliency methods; Recovery in 
various networks; Theory on robust 
networks; Customer protection and serviceability perception; Cost models and 
business impact; Cultural and legal aspects; 
Future advanced network development and evolution; Standards and guidelines; 
Lawful interception and defense strategies; 
Security issues with emergency services and disaster recovery

EMERG: Networks and applications emergency services

   Survivability architecture for e-commerce; Emergency and non-emergency 
services; Emergency coverage and intermittent 
services; PSAPs and emergency services; Future 911 PSAP message interfaces; 
Reliable emergency communications; Next 
generation of emergency communications; Response to the networks emergency 
services; Voice emergency notification services

MONIT: End-to-end sampling, measurement, and monitoring

   Internet monitoring techniques and procedures; Monitoring tools, functions, 
and metrics; Combining, filtering, and 
reporting monitoring metrics; Theory and practice on sampling/inversion problem 
(accuracy, complexity, etc.); Distributed 
and adaptive sampling techniques; Sampling & inverting traffic with passive and 
active systems; Internet end-to-end 
measurements from a sampling perspective; Impact of sampling on anomaly 
detection; Mechanisms for sampling the Internet 
traffic or collected traces; On-line and off-line metrics and measurements; 
Incident estimation and monitoring; Internet 
access monitoring; Spy software; Internet monitoring, filtering and blocking 
software; Monitoring Internet traffic to 
optimize network bandwidth; Remote monitoring

REPORT: Experiences & lessons learnt in securing networks and applications

   Platforms for electronic distribution of plane tickets; Platforms for 
electronic distribution of hotel booking; Data 
accuracy; E-trade strengths and weaknesses; Malicious spyware; Blocking without 
quarantining the systems/networks; 
Out-of-band intrusion prevention; Antivirus e-mail gateways software; Security 
and vulnerability engineering

USSAF: User safety, privacy, and protection over Internet

   Countermeasures on fraud prevention; Trust, trust estimators, and trust 
mitigation in public e-business; Customer 
protection and serviceability perception; Privacy impacts of emergency presence 
services; Authentication/authorization; 
Biometric methodologies and ID Cards; Security on hardware and smart cards; 
Identity management; Automated security 
analysis; Electronic Privacy; Anonymity and pseudo-anonymity; Security 
compliance; Public safety, Instance messages; 
Presence protocols; Priority user service

SYVUL: Systems vulnerabilities

   Vulnerability specification languages; System vulnerability assessment; 
Formal methods for safety-critical systems; 
Prediction capabilities of vulnerability discovery models; Highly vulnerable 
systems; Critical vulnerabilities; Errors and 
configurations leading to vulnerabilities; Incident reports and handling; 
Networks resiliency methods; Capacity planning 
for resilience and emergency; Operational resilience; Theory of 
disaster-tolerant systems; Web service vulnerability; 
Protocol vulnerability; Vulnerabilities in database systems; Vulnerability in 
control systems; Vulnerability analysis and. 
requirements for the security; Vulnerabilities by self-managed sensors; 
Recovery by disruption resource procedures; Common 
vulnerability scoring systems; Cost models and vulnerability business impact

SYDIA: Systems diagnosis

   Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; 
Process algebras for systems diagnosis; 
Probabilistic diagnosis of multiprocessor systems; Self-diagnosis in 
distributed systems; Cognitive system diagnosis; 
System diagnosis using propagation models; Technical intuition in systems 
diagnosis; Managing conflicts in systems 
diagnosis; Hybrid systems diagnosis; Diagnosis tools; End-to-end diagnosis; 
Remote system diagnosis; Diagnosis licensing; 
Real-time symptom detection and fixing actions; Forensic/real-time/anticipative 
diagnosis; Diagnosing mobility-oriented 
systems; Diagnosis of discrete event systems; Diagnosis of complex dynamical 
systems

CYBER-FRAUD: Cyber fraud

   Epidemiological models for warware and cyber-crime propagation; Record and 
retrieval of cyber-crimes; Forensic 
analysis; Cyber-crime prevention; Cyber-crime vulnerabilities; 
Cyber-counterattack at source; Distributed cyber-attacks; 
Orchestrated cyber-attacks; Recursion attacks; Cyber-storm attacks; Spyware and 
malware; Cyber-pranks, hoaxes; 
Phishing/Pharming and anti-phishing; Cyber-terrorism; Online cyber-crime 
reporting; Accuracy and security of 
cyber-reports; Fighting cyber-crimes; Cyber-crime laws

BUSINESS: Business continuity

   Regulatory compliance; Techniques for business continuity planning in the 
real world; Business contingency and 
resumption planning; Emotional continuity management; Semiotic engineering of 
online services; Emergency preparedness for 
industry and commerce; Updating, auditing and testing plans; Reduce downtime 
with continuous backup; Global connectivity 
and international formats; Web-based planning tools; Automatic high speed 
notification and response for business 
continuity; Centralized management; Businesses continuity planning software; 
On-demand business transformation

RISK: Risk assessment

   Risk assessment information systems; Modeling risk assessment; Risk 
Assessment methods; Global risk assessment; 
Qualitative risk assessments; Quantitative risk assessment; Challenges in risk 
assessment; Risk assessment for economy; 
Risk assessment for security of communications systems; Safety risk assessment; 
Health system risk assessment; Integrated 
risk assessment; Planning tools for proactive risk assessment; Risk management; 
Risk factors and economic impact; Risk 
metrics and calibration; Precaution and risk balance; Risk and economic 
analysis of terrorism events; Risk analysis for 
extreme events; Life cycle assessment in decision making; Environmental risk 
assessment; Credit ratings risk assessment; 
Risk Assessment statistics & numerical data; Risk assessment standards; Risk 
assessment tools and support software

TRUST: Privacy and trust in pervasive communications

   Trust development and management; Engineering requirements for trust 
management; Formalisms for trust specification, 
verification and validation; Logics for the analysis of trust and for reasoning 
about trust; Legal framework for online 
trust environments; Trust in semantic Web services; Reputation systems; 
Distributed trust management; Trust on anonymous 
documents; Privacy and trust; Trust in collaborative work and risk assessment; 
Risk analysis to assess user trust; Human 
behaviors in trusted environments; Trust in virtual communities; Trust 
mediation in knowledge management; Trust planning 
and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; 
Identity Management in pervasive environments 
(requirements, levels of abstractions, context, protection, etc.); Assurance 
(compliance, assurance, audit, security 
requirements)

RIGHT: Digital rights management

   Ontology and frameworks on digital rights management; Digital rights 
property languages; Semantic and encoding of 
digital rights; Rights granularity; Digital right technologies; Digital rights 
management schemes; Federated digital 
rights management; Distributed digital rights management; Copyright protection 
schemes; Digital rights management ands 
social norms; Faire use, innovation, and competition; Trading fair use for 
digital rights management; Digital rights 
management and open access; Privacy engineering for digital rights management; 
Value-centered design for digital rights 
management; Free software and digital rights management; P2P and digital rights 
management; Broadband/IPTV content 
protection and digital rights management; Digital right management and content 
licensing; Digital rights management issues 
in real-time and safety/mission systems; RFID tags for digital rights 
management; Digital rights management in learning 
systems; Legal policy and digital right management

BIOTEC: Biometric techniques

   Models and techniques for biometric technologies; Finger, facial, iris, 
voice, and skin biometrics; Biometric security; 
Signature recognition; Multimodal biometrics; Verification and identification 
techniques; Accuracy of biometric 
technologies; Authentication smart cards and biometric metrics; Performance and 
assurance testing; Limitations of 
biometric technologies; Biometric card technologies; Biometric wireless 
technologies; Biometric software and hardware; 
Biometric standards

EMDRM: Enterprise & Media DRM

   Digital Policy Management; Enterprise Rights Management (adoption and case 
studies); DRM Interoperability; Operational 
Risk Management; Compliance and Regulatory Frameworks (SOX, Basel II, HIPPA, 
etc.); Corporate Governance; Content and 
Knowledge Management (financial, CAD, IP, trade secrets, etc.); 
Interorganizational System (IOS); Retention Policies and 
Classification; Traceability, Monitoring, tracking, usage metering, audit trails

--------------------
Technical Program Committee
http://www.iaria.org/conferences2012/ComICIMP12.html
====================

Reply via email to