  | 
         The Fourth International Conference on Internet Monitoring and Protection  
             ICIMP 2009  
           May 24-28, 2009 - Venice/Mestre, Italy  | 
       
     
     
       
         
             
              | Technical Co-Sponsors and Logistics Supporters  | 
             
           
                         | 
         
     
     
     
       
         
           
             
               | Submission (full paper)  | 
               Dec 10 December 22, 2008 | 
              
             
               | Notification | 
               January 25 January 31, 2009  | 
              
             
               | Registration | 
               February 15, 2009  | 
              
             
               | Camera ready  | 
               February 20, 2009  | 
              
             | 
         Authors of selected papers will be invited to submit extended versions to a IARIA Journal
  
           Publisher: Conference Publishing Services 
           Posted: IEEE Digital Library 
           Indexing process 
          | 
       
     
     All tracks/topics are open to both research and industry contributions.
     Tracks:
     TRASI: Internet traffic surveillance      and interception
     
       Methods and context to classify legal and illegal traffic; 
         Methods and   procedure to classify wanted and undesired traffic; 
         Overloads, attacks, and   failures; 
         Detection of attacks via protocols and applications; 
         Undesired   traffic evaluation; 
         Traffic identification caused by malicious code (spam,   virii, and worms, etc.); 
         Traffic profile during disaster recovery; 
         Traffic   during active emergency services; 
         Early warning on growing undesired   traffic; 
         Access control and audit detection points; 
         Denial of   service; 
         Spoofing; 
         Lawful interception; 
         Multi-modal undesired traffic   detection; 
         Measurements and data mining correlation; 
         Countermeasures on   undesired traffic
     
     IPERF: Internet      performance
     
       Performance-oriented design; 
         Active and passive performance   monitoring; Performance metrics and measurements; 
         Measurement-based   performance evaluation in Internet; 
         System measurement and   monitoring; 
         Performance model verification and validation; 
         Stochastic   modeling (queues,  Petri nets, etc.); 
         Statistical performance; 
         Performance   of Internet routing; 
         Performance optimization; 
         Internet performance   prediction; 
         Internet performance evaluation studies; 
         Internet performance   testbeds; 
         Performance evaluation of Web search engines; 
         Performance   evaluation of P2P systems 
     
     RTSEC: Security      for Internet-based real-time systems
     
       Security and availability of Web Services; 
         Security/Performance   trade-off; 
         Distributed systems security; 
         Language-based   security; 
         Formalisms for security and protocol verification; 
         Performance   on firewall protected real-time systems; 
         Security management in real-time   systems; 
         Metrics and techniques for security risk assessment; 
         Internet   monitoring and response security service; 
         Protecting emergency communications   from misuse and exploitation; 
         Maintaining security in the face of   disaster; 
         Intrusion prevention and detection systems; 
         Secure networks from   web-based threats 
     
     DISAS: Disaster prevention and      recovery
     
       Survivable networks on chips; 
         Intrusion detection and defense; 
         Alerting   systems based on outstanding network events; 
         Recovery methods in various   networks; 
         Disaster diagnosis and continuity plans; 
         Fighting mechanisms for   disaster of networks and applications; 
         Global positioning systems; 
         Vehicle   localization and navigation systems; 
         Disaster relief agencies to perform   recovery operations; 
         Survivability-driven defense and do-it-yourself disaster   recovery; 
         Security during disaster recovery; 
         Budgeting disaster recovery; 
         Networks emergency services; 
         Reliable emergency communications and   applications; 
         Response to the networks emergency services; 
         Disaster   prevention and recovery; 
         Fighting mechanisms for disaster of networks and   applications; Networks resiliency methods; 
         Recovery in various networks; 
         Theory on robust networks; 
         Customer protection and serviceability   perception; 
         Cost models and business impact; 
         Cultural and legal aspects; 
         Future advanced network development and evolution; 
         Standards and   guidelines; 
         Lawful interception and defense strategies; 
         Security issues   with emergency services and disaster recovery 
     
     EMERG: Networks and applications      emergency services
     
       Survivability architecture for e-commerce; 
         Emergency and non-emergency   services; 
         Emergency coverage and intermittent services; 
         PSAPs and emergency   services; 
         Future 911 PSAP message interfaces; 
         Reliable emergency   communications; 
         Next generation of emergency communications; 
         Response to the   networks emergency services; 
         Voice emergency notification services 
     
     MONIT: End-to-end sampling,      measurement, and monitoring
     
       Internet monitoring techniques and procedures; 
         Monitoring tools, functions,   and metrics; 
         Combining, filtering, and reporting monitoring metrics; 
         Theory   and practice on sampling/inversion problem (accuracy, complexity,   etc.); 
         Distributed and adaptive sampling techniques; 
         Sampling &   inverting traffic with passive and active systems; 
         Internet end-to-end   measurements from a sampling perspective; 
         Impact of sampling on anomaly   detection; 
         Mechanisms for sampling the Internet traffic or collected   traces; 
         On-line and off-line metrics and measurements; 
         Incident estimation   and monitoring; 
         Internet access monitoring; 
         Spy   software; 
         Internet monitoring, filtering and blocking software; 
         Monitoring   Internet traffic to optimize network bandwidth;
         Remote monitoring 
     
     REPORT: Experiences & lessons      learnt in securing networks and applications
     
       Platforms for electronic distribution of plane tickets; 
         Platforms for   electronic distribution of hotel booking; 
         Data accuracy; 
         E-trade strengths   and weaknesses; 
         Malicious spyware; 
         Blocking without quarantining the   systems/networks; 
         Out-of-band intrusion prevention; 
         Antivirus e-mail   gateways software; 
         Security and vulnerability engineering
     
     USSAF: User safety, privacy, and protection      over Internet
     
       Countermeasures on fraud prevention; 
         Trust, trust estimators, and trust   mitigation in public e-business; 
         Customer protection and serviceability   perception; 
         Privacy impacts of emergency presence   services; 
         Authentication/authorization;
         Biometric methodologies and ID   Cards; 
         Security on hardware and smart cards; 
         Identity   management; 
         Automated security analysis; 
         Electronic Privacy; 
         Anonymity and   pseudo-anonymity; 
         Security compliance; 
         Public safety, Instance   messages; 
         Presence protocols; 
         Priority user service 
     
     SYVUL: Systems vulnerabilities
     
       Vulnerability specification languages; 
         System vulnerability assessment; 
         Formal methods for safety-critical systems; 
         Prediction capabilities of   vulnerability discovery models; 
         Highly vulnerable systems; 
         Critical   vulnerabilities; 
         Errors and configurations leading to   vulnerabilities; 
         Incident reports and handling; 
         Networks resiliency   methods; 
         Capacity planning for resilience and emergency; 
         Operational   resilience; 
         Theory of disaster-tolerant systems; 
         Web service   vulnerability; 
         Protocol vulnerability; Vulnerabilities in database   systems; 
         Vulnerability in control systems; 
         Vulnerability analysis and.   requirements for the security; 
         Vulnerabilities by self-managed   sensors; 
         Recovery by disruption resource procedures; 
         Common vulnerability   scoring systems; 
         Cost models and vulnerability business impact
     
     SYDIA: Systems diagnosis
     
       Diagnosis platforms; 
         Diagnosis policy language; 
         Diagnosis event   formats; 
         Process algebras for systems diagnosis; 
         Probabilistic diagnosis of   multiprocessor systems; 
         Self-diagnosis in distributed systems; 
         Cognitive   system diagnosis; 
         System diagnosis using propagation models; 
         Technical   intuition in systems diagnosis; 
         Managing conflicts in systems   diagnosis; 
         Hybrid systems diagnosis; 
         Diagnosis tools; 
         End-to-end   diagnosis; 
         Remote system diagnosis; 
         Diagnosis licensing; 
         Real-time symptom   detection and fixing actions; 
         Forensic/real-time/anticipative   diagnosis; 
         Diagnosing mobility-oriented systems; 
         Diagnosis of discrete event   systems; 
         Diagnosis of complex dynamical systems
     
     CYBER-FRAUD: Cyber fraud
     
       Epidemiological models for warware and cyber-crime propagation; 
         Record and   retrieval of cyber-crimes; 
         Forensic analysis; 
         Cyber-crime   prevention; 
         Cyber-crime vulnerabilities; 
         Cyber-counterattack at   source; 
         Distributed cyber-attacks; 
         Orchestrated cyber-attacks; 
         Recursion   attacks; 
         Cyber-storm attacks; 
         Spyware and malware; 
         Cyber-pranks,   hoaxes; 
         Phishing/Pharming and anti-phishing; 
         Cyber-terrorism; 
         Online   cyber-crime reporting; 
         Accuracy and security of cyber-reports; 
         Fighting   cyber-crimes; 
         Cyber-crime laws 
     
     BUSINESS: Business   continuity
     
       Regulatory compliance; 
         Techniques for business continuity planning in the real   world; 
         Business contingency and resumption planning; 
         Emotional continuity   management; 
         Semiotic engineering of online services; 
         Emergency   preparedness for industry and commerce; 
         Updating, auditing and testing   plans; 
         Reduce downtime with continuous backup; 
         Global connectivity and   international formats; 
         Web-based planning tools; 
         Automatic high speed   notification and response for business continuity; 
         Centralized management; 
         Businesses continuity planning software; 
         On-demand business transformation
     
     RISK: Risk   assessment
     
       Risk assessment information systems; 
         Modeling risk assessment; 
         Risk   Assessment methods; 
         Global risk assessment; 
         Qualitative risk   assessments; 
         Quantitative risk assessment; 
         Challenges in risk assessment; 
         Risk assessment for economy; 
         Risk assessment for security of   communications systems; 
         Safety risk assessment; 
         Health system risk   assessment; 
         Integrated risk assessment; 
         Planning tools for proactive risk   assessment; 
         Risk management; 
         Risk factors and economic impact; 
         Risk   metrics and calibration; 
         Precaution and risk balance; 
         Risk and economic   analysis of terrorism events; 
         Risk analysis for extreme events; 
         Life cycle   assessment in decision making; 
         Environmental risk assessment; 
         Credit   ratings risk assessment; 
         Risk Assessment statistics & numerical   data; 
         Risk assessment standards; 
         Risk assessment tools and support software
     
     TRUST: Privacy   and trust in pervasive communications
     
       Trust development and management; 
         Engineering requirements for trust   management; 
         Formalisms for trust specification, verification and   validation; 
         Logics for the analysis of trust and for reasoning about   trust; 
         Legal framework for online trust environments; 
         Trust in semantic Web   services; 
         Reputation systems; 
         Distributed trust management; 
         Trust on   anonymous documents; 
         Privacy and trust; 
         Trust in collaborative work and risk   assessment; 
         Risk analysis to assess user trust; 
         Human behaviors in trusted   environments; 
         Trust in virtual communities; 
         Trust mediation in knowledge   management; 
         Trust planning and evaluation metrics; 
         Trust policies; 
         Self-adaptable trust mechanisms; 
         Identity Management in pervasive   environments (requirements, levels of abstractions, context, protection, etc.); 
         Assurance (compliance, assurance, audit, security requirements) 
     
     RIGHT: Digital   rights management
     
       Ontology and frameworks on digital rights management; 
         Digital rights property   languages; 
         Semantic and encoding of digital rights; 
         Rights   granularity; 
         Digital right technologies; 
         Digital rights management   schemes; 
         Federated digital rights management; 
         Distributed digital rights   management; 
         Copyright protection schemes; 
         Digital rights management ands   social norms; 
         Faire use, innovation, and competition; 
         Trading fair use for   digital rights management; 
         Digital rights management and open   access; 
         Privacy engineering for digital rights management; 
         Value-centered   design for digital rights management; 
         Free software and digital rights   management; 
         P2P and digital rights management; 
         Broadband/IPTV content   protection and digital rights management; 
         Digital right management and content   licensing; 
         Digital rights management issues in real-time and safety/mission   systems; 
         RFID tags for digital rights management; 
         Digital rights   management in learning systems; 
         Legal policy and digital right management 
     
     BIOTEC:   Biometric techniques
     
       Models and techniques for biometric technologies; 
         Finger, facial, iris, voice,   and skin biometrics; 
         Biometric security; 
         Signature recognition; 
         Multimodal biometrics; 
         Verification and identification techniques; 
         Accuracy of biometric technologies; 
         Authentication smart cards and   biometric metrics; 
         Performance and assurance testing; 
         Limitations of   biometric technologies; 
         Biometric card technologies; 
         Biometric wireless   technologies; 
         Biometric software and hardware; 
         Biometric standards
     
     EMDRM: Enterprise & Media DRM
     
       Digital Policy Management; 
         Enterprise Rights Management (adoption and case   studies); 
         DRM Interoperability; 
         Operational Risk Management; 
         Compliance   and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.); 
         Corporate   Governance; 
         Content and Knowledge Management (financial, CAD, IP, trade   secrets, etc.); 
         Interorganizational System (IOS); 
         Retention Policies and   Classification; 
         Traceability, Monitoring, tracking, usage metering, audit   trails