ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WDLPF 2013 - First Workshop on Data Leakage Prevention and Forensics

Date2013-05-16 - 2013-05-18

Deadline2013-02-15

VenueSuzhou, China China

Keywords

Websitehttp://www.itqm-meeting.org

Topics/Call fo Papers

Workshop Chair:
Jinqiao Shi ( shijianqiao-AT-iie.ac.cn, Chinese Academy of Sciences)
Xiaojun Chen ( chenxiaojun-AT-iie.ac.cn, Chinese Academy of Sciences)
Peng Zhang ( zhangpeng04-AT-gmail.com,Chinese Academy of Sciences)
Data leakage is becoming a serious problem for military and enterprises, resulting in huge losses in privacy and security. Data leakage prevention and forensics can be applied to protect significantly important data and against network crimes. Related fieldsinclude but not limit toinsider threatdetection, social behavior analysis, Trojan detection, information trapping and computer crime forensics. The aim of this workshop is to gather researchers and practitioners in related areasto discuss cutting-edge data leakage prevention and forensicssolutions. The topicsinclude, but not limited to:
* Insider threats detection
* Operating systems and database security
* Security in cloud computing
* Security in social networks
* Privacy protection
* Intelligent information filter
* Users behavior patterns discovery
* Web mining & security
* Information trappingand honey pot
* Security situation awareness
* Network forensics and traffic analysis
* Forensics of virtual and cloud environments
* Insider forensics
PC Members:
Jinqiao Shi, Institute of Information Engineering, Chinese Academy of Science, shijinqiao-AT-iie.ac.cn.
Fei Xu, Institute of Information Engineering, Chinese Academy of Science, xufei-AT-iie.ac.cn;
Haoliang Zhang, Institute of Information Engineering, Chinese Academy of Science, zhanghaoliang-AT-iie.ac.cn .
Qingfeng Tan, Institute of Information Engineering, Chinese Academy of Science, tanqingfen-AT-iie.ac.cn .
Lanlan Hu, Institute of Information Engineering, Chinese Academy of Science, hulanlan-AT-iie.ac.cn .
Xiao Wang, Institute of Computing Technology, Chinese Academy of Science, wangxiao-AT-nelmail.iie.ac.cn .
Yong Wang, University of Electronic Science and Technology of China, cla-AT-uestc.edu.cn;
WenyuZang, Institute of Information Engineering, Chinese Academy of Science,zangwenyu-AT-nelmail.iie.ac.cn .
Peng Wang, Institute of Information Engineering, Chinese Academy of Science,wangpeng-AT-nelmail.iie.ac.cn .
Jing Guo, Institute of Information Engineering, Chinese Academy of Science, guojing-AT-nelmail.iie.ac.cn .
Yanmin Shang, Institute of Information Engineering, Chinese Academy of Science, shangyanmin-AT-nelmail.iie.ac.cn .
ZhiQiao, Institute of Information Engineering, Chinese Academy of Science,qiaozhi-AT-nelmail.iie.ac.cn .
Yanan Cao, Institute of Information Engineering, Chinese Academy of Science, caoyanan-AT-iie.ac.cn .

Last modified: 2012-11-26 22:39:48