WDLPF 2013 - First Workshop on Data Leakage Prevention and Forensics
Date2013-05-16 - 2013-05-18
Deadline2013-02-15
VenueSuzhou, China
Keywords
Websitehttps://www.itqm-meeting.org
Topics/Call fo Papers
Workshop Chair:
Jinqiao Shi ( shijianqiao-AT-iie.ac.cn, Chinese Academy of Sciences)
Xiaojun Chen ( chenxiaojun-AT-iie.ac.cn, Chinese Academy of Sciences)
Peng Zhang ( zhangpeng04-AT-gmail.com,Chinese Academy of Sciences)
Data leakage is becoming a serious problem for military and enterprises, resulting in huge losses in privacy and security. Data leakage prevention and forensics can be applied to protect significantly important data and against network crimes. Related fieldsinclude but not limit toinsider threatdetection, social behavior analysis, Trojan detection, information trapping and computer crime forensics. The aim of this workshop is to gather researchers and practitioners in related areasto discuss cutting-edge data leakage prevention and forensicssolutions. The topicsinclude, but not limited to:
* Insider threats detection
* Operating systems and database security
* Security in cloud computing
* Security in social networks
* Privacy protection
* Intelligent information filter
* Users behavior patterns discovery
* Web mining & security
* Information trappingand honey pot
* Security situation awareness
* Network forensics and traffic analysis
* Forensics of virtual and cloud environments
* Insider forensics
PC Members:
Jinqiao Shi, Institute of Information Engineering, Chinese Academy of Science, shijinqiao-AT-iie.ac.cn.
Fei Xu, Institute of Information Engineering, Chinese Academy of Science, xufei-AT-iie.ac.cn;
Haoliang Zhang, Institute of Information Engineering, Chinese Academy of Science, zhanghaoliang-AT-iie.ac.cn .
Qingfeng Tan, Institute of Information Engineering, Chinese Academy of Science, tanqingfen-AT-iie.ac.cn .
Lanlan Hu, Institute of Information Engineering, Chinese Academy of Science, hulanlan-AT-iie.ac.cn .
Xiao Wang, Institute of Computing Technology, Chinese Academy of Science, wangxiao-AT-nelmail.iie.ac.cn .
Yong Wang, University of Electronic Science and Technology of China, cla-AT-uestc.edu.cn;
WenyuZang, Institute of Information Engineering, Chinese Academy of Science,zangwenyu-AT-nelmail.iie.ac.cn .
Peng Wang, Institute of Information Engineering, Chinese Academy of Science,wangpeng-AT-nelmail.iie.ac.cn .
Jing Guo, Institute of Information Engineering, Chinese Academy of Science, guojing-AT-nelmail.iie.ac.cn .
Yanmin Shang, Institute of Information Engineering, Chinese Academy of Science, shangyanmin-AT-nelmail.iie.ac.cn .
ZhiQiao, Institute of Information Engineering, Chinese Academy of Science,qiaozhi-AT-nelmail.iie.ac.cn .
Yanan Cao, Institute of Information Engineering, Chinese Academy of Science, caoyanan-AT-iie.ac.cn .
Jinqiao Shi ( shijianqiao-AT-iie.ac.cn, Chinese Academy of Sciences)
Xiaojun Chen ( chenxiaojun-AT-iie.ac.cn, Chinese Academy of Sciences)
Peng Zhang ( zhangpeng04-AT-gmail.com,Chinese Academy of Sciences)
Data leakage is becoming a serious problem for military and enterprises, resulting in huge losses in privacy and security. Data leakage prevention and forensics can be applied to protect significantly important data and against network crimes. Related fieldsinclude but not limit toinsider threatdetection, social behavior analysis, Trojan detection, information trapping and computer crime forensics. The aim of this workshop is to gather researchers and practitioners in related areasto discuss cutting-edge data leakage prevention and forensicssolutions. The topicsinclude, but not limited to:
* Insider threats detection
* Operating systems and database security
* Security in cloud computing
* Security in social networks
* Privacy protection
* Intelligent information filter
* Users behavior patterns discovery
* Web mining & security
* Information trappingand honey pot
* Security situation awareness
* Network forensics and traffic analysis
* Forensics of virtual and cloud environments
* Insider forensics
PC Members:
Jinqiao Shi, Institute of Information Engineering, Chinese Academy of Science, shijinqiao-AT-iie.ac.cn.
Fei Xu, Institute of Information Engineering, Chinese Academy of Science, xufei-AT-iie.ac.cn;
Haoliang Zhang, Institute of Information Engineering, Chinese Academy of Science, zhanghaoliang-AT-iie.ac.cn .
Qingfeng Tan, Institute of Information Engineering, Chinese Academy of Science, tanqingfen-AT-iie.ac.cn .
Lanlan Hu, Institute of Information Engineering, Chinese Academy of Science, hulanlan-AT-iie.ac.cn .
Xiao Wang, Institute of Computing Technology, Chinese Academy of Science, wangxiao-AT-nelmail.iie.ac.cn .
Yong Wang, University of Electronic Science and Technology of China, cla-AT-uestc.edu.cn;
WenyuZang, Institute of Information Engineering, Chinese Academy of Science,zangwenyu-AT-nelmail.iie.ac.cn .
Peng Wang, Institute of Information Engineering, Chinese Academy of Science,wangpeng-AT-nelmail.iie.ac.cn .
Jing Guo, Institute of Information Engineering, Chinese Academy of Science, guojing-AT-nelmail.iie.ac.cn .
Yanmin Shang, Institute of Information Engineering, Chinese Academy of Science, shangyanmin-AT-nelmail.iie.ac.cn .
ZhiQiao, Institute of Information Engineering, Chinese Academy of Science,qiaozhi-AT-nelmail.iie.ac.cn .
Yanan Cao, Institute of Information Engineering, Chinese Academy of Science, caoyanan-AT-iie.ac.cn .
Other CFPs
- The First Workshop on Quality Safety Management
- International Workshop on Supply Chain Decisions Considering Human Behaviors
- International Workshop on Intelligent Knowledge Management
- 7th International Workshop on Computational Methods in Energy Economics (CMEE2013)
- The 3rd Workshop on Risk Correlation Analysis and Risk Measurement (RCARM2013)
Last modified: 2012-11-26 22:39:48