|
The Eighth International Conference on Internet Monitoring and Protection
ICIMP 2013
June 23 - 28, 2013 - Rome, Italy |
Technical Co-Sponsors and Logistics Supporters |
|
|
|
|
ARCHIVE |
printer friendly pdf version |
|
|
|
- Colocated with other events part of WebTel 2013
- Posters will be presented during the conference
- A Work in Progress track is available for preliminary work
- A Research Ideas track is available for ideas in early stages
Submission (full paper) |
January 28 February 19, 2013 |
Notification |
March 23, 2013 |
Registration |
April 6, 2013 |
Camera ready |
April 20, 2013 |
ISSN: 2308-3980
ISBN: 978-1-61208-281-3 |
|
All tracks/topics are open to both research and industry contributions.
Tracks:
TRASI: Internet traffic surveillance and interception
Methods and context to classify legal and illegal traffic;
Methods and procedure to classify wanted and undesired traffic;
Overloads, attacks, and failures;
Detection of attacks via protocols and applications;
Undesired traffic evaluation;
Traffic identification caused by malicious code (spam, virii, and worms, etc.);
Traffic profile during disaster recovery;
Traffic during active emergency services;
Early warning on growing undesired traffic;
Access control and audit detection points;
Denial of service;
Spoofing;
Lawful interception;
Multi-modal undesired traffic detection;
Measurements and data mining correlation;
Countermeasures on undesired traffic
IPERF: Internet performance
Performance-oriented design;
Active and passive performance monitoring; Performance metrics and measurements;
Measurement-based performance evaluation in Internet;
System measurement and monitoring;
Performance model verification and validation;
Stochastic modeling (queues, Petri nets, etc.);
Statistical performance;
Performance of Internet routing;
Performance optimization;
Internet performance prediction;
Internet performance evaluation studies;
Internet performance testbeds;
Performance evaluation of Web search engines;
Performance evaluation of P2P systems
RTSEC: Security for Internet-based real-time systems
Security and availability of Web Services;
Security/Performance trade-off;
Distributed systems security;
Language-based security;
Formalisms for security and protocol verification;
Performance on firewall protected real-time systems;
Security management in real-time systems;
Metrics and techniques for security risk assessment;
Internet monitoring and response security service;
Protecting emergency communications from misuse and exploitation;
Maintaining security in the face of disaster;
Intrusion prevention and detection systems;
Secure networks from web-based threats
DISAS: Disaster prevention and recovery
Survivable networks on chips;
Intrusion detection and defense;
Alerting systems based on outstanding network events;
Recovery methods in various networks;
Disaster diagnosis and continuity plans;
Fighting mechanisms for disaster of networks and applications;
Global positioning systems;
Vehicle localization and navigation systems;
Disaster relief agencies to perform recovery operations;
Survivability-driven defense and do-it-yourself disaster recovery;
Security during disaster recovery;
Budgeting disaster recovery;
Networks emergency services;
Reliable emergency communications and applications;
Response to the networks emergency services;
Disaster prevention and recovery;
Fighting mechanisms for disaster of networks and applications; Networks resiliency methods;
Recovery in various networks;
Theory on robust networks;
Customer protection and serviceability perception;
Cost models and business impact;
Cultural and legal aspects;
Future advanced network development and evolution;
Standards and guidelines;
Lawful interception and defense strategies;
Security issues with emergency services and disaster recovery
EMERG: Networks and applications emergency services
Survivability architecture for e-commerce;
Emergency and non-emergency services;
Emergency coverage and intermittent services;
PSAPs and emergency services;
Future 911 PSAP message interfaces;
Reliable emergency communications;
Next generation of emergency communications;
Response to the networks emergency services;
Voice emergency notification services
MONIT: End-to-end sampling, measurement, and monitoring
Internet monitoring techniques and procedures;
Monitoring tools, functions, and metrics;
Combining, filtering, and reporting monitoring metrics;
Theory and practice on sampling/inversion problem (accuracy, complexity, etc.);
Distributed and adaptive sampling techniques;
Sampling & inverting traffic with passive and active systems;
Internet end-to-end measurements from a sampling perspective;
Impact of sampling on anomaly detection;
Mechanisms for sampling the Internet traffic or collected traces;
On-line and off-line metrics and measurements;
Incident estimation and monitoring;
Internet access monitoring;
Spy software;
Internet monitoring, filtering and blocking software;
Monitoring Internet traffic to optimize network bandwidth;
Remote monitoring
REPORT: Experiences & lessons learnt in securing networks and applications
Platforms for electronic distribution of plane tickets;
Platforms for electronic distribution of hotel booking;
Data accuracy;
E-trade strengths and weaknesses;
Malicious spyware;
Blocking without quarantining the systems/networks;
Out-of-band intrusion prevention;
Antivirus e-mail gateways software;
Security and vulnerability engineering
USSAF: User safety, privacy, and protection over Internet
Countermeasures on fraud prevention;
Trust, trust estimators, and trust mitigation in public e-business;
Customer protection and serviceability perception;
Privacy impacts of emergency presence services;
Authentication/authorization;
Biometric methodologies and ID Cards;
Security on hardware and smart cards;
Identity management;
Automated security analysis;
Electronic Privacy;
Anonymity and pseudo-anonymity;
Security compliance;
Public safety, Instance messages;
Presence protocols;
Priority user service
SYVUL: Systems vulnerabilities
Vulnerability specification languages;
System vulnerability assessment;
Formal methods for safety-critical systems;
Prediction capabilities of vulnerability discovery models;
Highly vulnerable systems;
Critical vulnerabilities;
Errors and configurations leading to vulnerabilities;
Incident reports and handling;
Networks resiliency methods;
Capacity planning for resilience and emergency;
Operational resilience;
Theory of disaster-tolerant systems;
Web service vulnerability;
Protocol vulnerability; Vulnerabilities in database systems;
Vulnerability in control systems;
Vulnerability analysis and. requirements for the security;
Vulnerabilities by self-managed sensors;
Recovery by disruption resource procedures;
Common vulnerability scoring systems;
Cost models and vulnerability business impact
SYDIA: Systems diagnosis
Diagnosis platforms;
Diagnosis policy language;
Diagnosis event formats;
Process algebras for systems diagnosis;
Probabilistic diagnosis of multiprocessor systems;
Self-diagnosis in distributed systems;
Cognitive system diagnosis;
System diagnosis using propagation models;
Technical intuition in systems diagnosis;
Managing conflicts in systems diagnosis;
Hybrid systems diagnosis;
Diagnosis tools;
End-to-end diagnosis;
Remote system diagnosis;
Diagnosis licensing;
Real-time symptom detection and fixing actions;
Forensic/real-time/anticipative diagnosis;
Diagnosing mobility-oriented systems;
Diagnosis of discrete event systems;
Diagnosis of complex dynamical systems
CYBER-FRAUD: Cyber fraud
Epidemiological models for warware and cyber-crime propagation;
Record and retrieval of cyber-crimes;
Forensic analysis;
Cyber-crime prevention;
Cyber-crime vulnerabilities;
Cyber-counterattack at source;
Distributed cyber-attacks;
Orchestrated cyber-attacks;
Recursion attacks;
Cyber-storm attacks;
Spyware and malware;
Cyber-pranks, hoaxes;
Phishing/Pharming and anti-phishing;
Cyber-terrorism;
Online cyber-crime reporting;
Accuracy and security of cyber-reports;
Fighting cyber-crimes;
Cyber-crime laws
BUSINESS: Business continuity
Regulatory compliance;
Techniques for business continuity planning in the real world;
Business contingency and resumption planning;
Emotional continuity management;
Semiotic engineering of online services;
Emergency preparedness for industry and commerce;
Updating, auditing and testing plans;
Reduce downtime with continuous backup;
Global connectivity and international formats;
Web-based planning tools;
Automatic high speed notification and response for business continuity;
Centralized management;
Businesses continuity planning software;
On-demand business transformation
RISK: Risk assessment
Risk assessment information systems;
Modeling risk assessment;
Risk Assessment methods;
Global risk assessment;
Qualitative risk assessments;
Quantitative risk assessment;
Challenges in risk assessment;
Risk assessment for economy;
Risk assessment for security of communications systems;
Safety risk assessment;
Health system risk assessment;
Integrated risk assessment;
Planning tools for proactive risk assessment;
Risk management;
Risk factors and economic impact;
Risk metrics and calibration;
Precaution and risk balance;
Risk and economic analysis of terrorism events;
Risk analysis for extreme events;
Life cycle assessment in decision making;
Environmental risk assessment;
Credit ratings risk assessment;
Risk Assessment statistics & numerical data;
Risk assessment standards;
Risk assessment tools and support software
TRUST: Privacy and trust in pervasive communications
Trust development and management;
Engineering requirements for trust management;
Formalisms for trust specification, verification and validation;
Logics for the analysis of trust and for reasoning about trust;
Legal framework for online trust environments;
Trust in semantic Web services;
Reputation systems;
Distributed trust management;
Trust on anonymous documents;
Privacy and trust;
Trust in collaborative work and risk assessment;
Risk analysis to assess user trust;
Human behaviors in trusted environments;
Trust in virtual communities;
Trust mediation in knowledge management;
Trust planning and evaluation metrics;
Trust policies;
Self-adaptable trust mechanisms;
Identity Management in pervasive environments (requirements, levels of abstractions, context, protection, etc.);
Assurance (compliance, assurance, audit, security requirements)
RIGHT: Digital rights management
Ontology and frameworks on digital rights management;
Digital rights property languages;
Semantic and encoding of digital rights;
Rights granularity;
Digital right technologies;
Digital rights management schemes;
Federated digital rights management;
Distributed digital rights management;
Copyright protection schemes;
Digital rights management ands social norms;
Faire use, innovation, and competition;
Trading fair use for digital rights management;
Digital rights management and open access;
Privacy engineering for digital rights management;
Value-centered design for digital rights management;
Free software and digital rights management;
P2P and digital rights management;
Broadband/IPTV content protection and digital rights management;
Digital right management and content licensing;
Digital rights management issues in real-time and safety/mission systems;
RFID tags for digital rights management;
Digital rights management in learning systems;
Legal policy and digital right management
BIOTEC: Biometric techniques
Models and techniques for biometric technologies;
Finger, facial, iris, voice, and skin biometrics;
Biometric security;
Signature recognition;
Multimodal biometrics;
Verification and identification techniques;
Accuracy of biometric technologies;
Authentication smart cards and biometric metrics;
Performance and assurance testing;
Limitations of biometric technologies;
Biometric card technologies;
Biometric wireless technologies;
Biometric software and hardware;
Biometric standards
EMDRM: Enterprise & Media DRM
Digital Policy Management;
Enterprise Rights Management (adoption and case studies);
DRM Interoperability;
Operational Risk Management;
Compliance and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.);
Corporate Governance;
Content and Knowledge Management (financial, CAD, IP, trade secrets, etc.);
Interorganizational System (IOS);
Retention Policies and Classification;
Traceability, Monitoring, tracking, usage metering, audit trails