|
||||||||||||
The International Conference on Internet Monitoring and Protection (ICIMP 2013) continues a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user. The design, implementation and deployment of large distributed systems are subject to conflicting or missing requirements leading to visible and/or hidden vulnerabilities. Vulnerability specification patterns and vulnerability assessment tools are used for discovering, predicting and/or bypassing known vulnerabilities. Vulnerability self-assessment software tools have been developed to capture and report critical vulnerabilities. Some of vulnerabilities are fixed via patches, other are simply reported, while others are self-fixed by the system itself. Despite the advances in the last years, protocol vulnerabilities, domain-specific vulnerabilities and detection of critical vulnerabilities rely on the art and experience of the operators; sometimes this is fruit of hazard discovery and difficult to be reproduced and repaired. System diagnosis represent a series of pre-deployment or post-deployment activities to identify feature interactions, service interactions, behavior that is not captured by the specifications, or abnormal behavior with respect to system specification. As systems grow in complexity, the need for reliable testing and diagnosis grows accordingly. The design of complex systems has been facilitated by CAD/CAE tools. Unfortunately, test engineering tools have not kept pace with design tools, and test engineers are having difficulty developing reliable procedures to satisfy the test requirements of modern systems. Therefore, rather than maintaining a single candidate system diagnosis, or a small set of possible diagnoses, anticipative and proactive mechanisms have been developed and experimented. In dealing with system diagnosis data overload is a generic and tremendously difficult problem that has only grown. Cognitive system diagnosis methods have been proposed to cope with volume and complexity. Attacks against private and public networks have had a significant spreading in the last years. With simple or sophisticated behavior, the attacks tend to damage user confidence, cause huge privacy violations and enormous economic losses. The CYBER-FRAUD track focuses on specific aspects related to attacks and counterattacks, public information, privacy and safety on cyber-attacks information. It also targets secure mechanisms to record, retrieve, share, interpret, prevent and post-analyze of cyber-crime attacks. Current practice for engineering carrier grade IP networks suggests n-redundancy schema. From the operational perspective, complications are involved with multiple n-box PoP. It is not guaranteed that this n-redundancy provides the desired 99.999% uptime. Two complementary solutions promote (i) high availability, which enables network-wide protection by providing fast recovery from faults that may occur in any part of the network, and (ii) non-stop routing. Theory on robustness stays behind the attempts for improving system reliability with regard to emergency services and containing the damage through disaster prevention, diagnosis and recovery. Highly reliable emergency communications are required by public safety and disaster relief agencies to perform recovery operations or associated with disasters or serious network events. Future advanced network development and evolution should take into consideration these requirements through solutions:
We solicit both academic, research, and industrial contributions. ICIMP 2013 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee. The Advisory Committee will periodically report special events relating to our community. The conference has the following specialized events: TRASI: Internet traffic surveillance and interception IPERF: Internet performance RTSEC: Security for Internet-based real-time systems DISAS: Disaster prevention and recovery EMERG: Networks and applications emergency services MONIT: End-to-end sampling, measurement, and monitoring REPORT: Experiences & lessons learnt in securing networks and applications USSAF: User safety, privacy, and protection over Internet SYVUL: Systems vulnerabilities SYDIA: Systems diagnosis CYBER-FRAUD: Cyber fraud BUSINESS: Business continuity RISK: Risk assessment TRUST: Privacy and trust in pervasive communications RIGHT: Digital rights management BIOTEC: Biometric techniques EMDRM: Enterprise & Media DRM We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status. Tutorials on specific related topics and panels on challenging areas are encouraged. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All topics and submission formats are open to both research and industry contributions. TRASI: Internet traffic surveillance and interception Methods and context to classify legal and illegal traffic IPERF: Internet performance Performance-oriented design RTSEC: Security for real-time systems Security and availability of Web Services DISAS: Disaster prevention and recovery Survivable networks on chips EMERG: Networks and applications emergency services Survivability architecture for e-commerce MONIT: End-to-end sampling, measurement, and monitoring Internet monitoring techniques and procedures REPORT: Experiences & lessons learnt in securing networks and applications Platforms for electronic distribution of plane tickets USSAF: User safety, privacy and protection over Internet Countermeasures on fraud prevention SYVUL: Systems vulnerabilities Vulnerability specification languages SYDIA: Systems diagnosis Diagnosis platforms CYBER-FRAUD: Cyber fraud Epidemiological models for warware and cyber-crime propagation BUSINESS: Business continuity RISK: Risk assessment TRUST: Privacy and trust in pervasive communications RIGHT: Digital rights management BIOTEC: Biometric techniques EMDRM: Enterprise & Media DRM
INSTRUCTION FOR THE AUTHORS Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals. Publisher: XPS (Xpert Publishing Services) Important deadlines:
Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system. Regular Papers (up to 6-10 page article) Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Your paper should also comply with the additional editorial rules. Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance. We would recommend that you not use too many extra pages, even if you can afford the extra fees. No more than 2 papers per event are recommended, as each paper must be separately registered and paid for. At least one author of each accepted paper must register to ensure that the paper will be included in the conference proceedings. Work in Progress (short paper up to 4 pages long) Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings. For more details, see the Work in Progress explanation page Posters (poster or collection of 6 to 8 slides) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site. For more details, see the Posters explanation page. Ideas (2 page proposal of novel idea) This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site. For more details, see the Ideas explanation page. Technical marketing/industrial/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to petre@iaria.org. Tutorials Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to petre@iaria.org Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site. For more information, petre@iaria.org Workshop proposals We welcome workshop proposals on issues complementary to the topics of this conference. Your requests should be forwarded to petre@iaria.org. |
||||||||||||
Copyright (c) 2006-2013, IARIA