NETSAP 2013 - The 4th IEEE International Workshop on Network Technologies for Security, Administration and Protection
Topics/Call fo Papers
This workshop aims to discuss and advance research and development of practical systems to fight against cyber attacks. The workshop focuses on development of practical systems and methodologies including measurement and analysis of real traffic and also privacy issues about network monitoring. The workshop addresses researchers from different disciplines in academia and industry, as well as practitioners, who share interests in countermeasures against cyber attacks.
Theme and Scope of the Workshop
Because of recent expansion of cyber attacks, many organizations and persons have been affected their activities on Internet. DDoS attacks to governmental sites, online trading/shopping sites are typical examples that many people can not access to their desired information. Furthermore there are many online services which offer DDoS attacks, so that attackers easily intimidate organizations to perform DDoS attacks. Increase of targeted attacks and variant explosion of malwares make security systems difficult to detect such malicious activities. As the results, incidents of information leakages have silently and frequently occurred in many organizations. In order to take countermeasures against the attacks, various types of systems have been proposed in literature. Although benchmark results and simulation experiments could show their good performance, most of the method could not be practically applicable to the real environment. Basically, this gap between in theory and practice is caused by too much benchmark-optimization on algorithms or by unrealistic assumptions on simulation settings. In this workshop, we focus on practical systems to fight against cyber attacks. Mechanisms, algorithms and strategies that are used in the real field will be discussed. Measurement and analysis of real traffic is also welcomed for aiming at new direction of the future research. In addition to the practical systems, we would like discuss on privacy issues about network monitoring.
Any submission whose content is relevant to the area of resource-aware system design will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome:
? Intrusion Detection
? DoS Attack Detection and Protection
? Malware Analysis
? IP Traceback
? Computer Forensics
? Countermeasures against Advanced Attacks
? Privacy in Network Monitoring
? Trustworthy
? Cryptography
? Secure computing
Submission
Papers must be submitted electronically via the NETSAP 2013 Submission Page once it becomes available.
Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submissio....
All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.
Theme and Scope of the Workshop
Because of recent expansion of cyber attacks, many organizations and persons have been affected their activities on Internet. DDoS attacks to governmental sites, online trading/shopping sites are typical examples that many people can not access to their desired information. Furthermore there are many online services which offer DDoS attacks, so that attackers easily intimidate organizations to perform DDoS attacks. Increase of targeted attacks and variant explosion of malwares make security systems difficult to detect such malicious activities. As the results, incidents of information leakages have silently and frequently occurred in many organizations. In order to take countermeasures against the attacks, various types of systems have been proposed in literature. Although benchmark results and simulation experiments could show their good performance, most of the method could not be practically applicable to the real environment. Basically, this gap between in theory and practice is caused by too much benchmark-optimization on algorithms or by unrealistic assumptions on simulation settings. In this workshop, we focus on practical systems to fight against cyber attacks. Mechanisms, algorithms and strategies that are used in the real field will be discussed. Measurement and analysis of real traffic is also welcomed for aiming at new direction of the future research. In addition to the practical systems, we would like discuss on privacy issues about network monitoring.
Any submission whose content is relevant to the area of resource-aware system design will be considered, but any submission whose subject matter is related to one of the following topics will be particularly welcome:
? Intrusion Detection
? DoS Attack Detection and Protection
? Malware Analysis
? IP Traceback
? Computer Forensics
? Countermeasures against Advanced Attacks
? Privacy in Network Monitoring
? Trustworthy
? Cryptography
? Secure computing
Submission
Papers must be submitted electronically via the NETSAP 2013 Submission Page once it becomes available.
Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submissio....
All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.
Other CFPs
- The 2nd IEEE Workshop on Modeling and Verifying Distributed Applications
- The 7th IEEE International Workshop on Middleware Architecture in the Internet
- The 2nd IEEE International Workshop on Methods for Establishing Trust with Open Data
- The 1st IEEE International Workshop on Future Internet Technologies
- The 5TH IEEE International Workshop on IT-enabled Services
Last modified: 2013-01-09 23:13:16