ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICKM 2015 - International Workshop on Internet Computing, Knowledge Management, Security and Trust

Date2015-07-17

Deadline2015-03-12

VenueZakynthos (Zante) Island, Greece Greece

Keywords

Websitehttps://cscc.co/Sessions-Workshops-Minis...

Topics/Call fo Papers

Nowadays, one of the key topics in technology refers to programming the web applications for various fields, as well as the way in which they are developed, optimized, accessed and secured. One of the aims of this session is to bring together academic scientists, researchers and students to interchange knowledge and disseminate new ideas towards challenges raised by recent advances in Internet computing and cyber-security. Another aim is to analyze the challenges posed and opportunities offered by creating and managing internet-centered multi-party applications like, for example, crowd-sourcing activities and innovation contests. Here, identifying possible adversaries' "undermining" or "gaming" activities may become increasingly relevant. At a more general level, internet mediated knowledge discovery and management, also demands protective action whereby increasing both trust and the long run reputation for these internet-based services.
Topics
e-Activities (e-Learning, e-Communities, e-Commerce, e-Management, e-Marketing, e-Governance, e-Science, e-Health, etc.);
Multimedia applications and virtual reality;
Wireless and mobile computing;
Cloud computing and storage;
Network optimization and security aspects;
Web applications and services security;
Security solutions for virtualization;
Identity, access and authorization management;
GPS, Location-Based Services;
Encryption and interception of communications;
Cryptographic applications; TCP/IP protocol suite security, secure routing, secure transmission protocols;
VoIP, SIP, IP telephony and Wi-Fi security;
Secure directories, e-mail, DNS, and other network services security;
Firewalls, VPNs, intruder detection and prevention systems;
Threat identification, honey pots security, incident handling;
Delivery techniques, including spam, voice mail and rank manipulation;
Phishing, rogue-AV, pharming, click-fraud, crime-ware, extortion and emerging attacks;
Malware, botnets, criminal/phishing gangs and collaboration or money laundering;
Techniques to avoid detection, tracking and takedown;
Knowledge about security leaks;
Networks of mobile agents, knowledge formation and security concerns;
Anonymizing personalized data and knowledge formation;
Anonymizing personalized data and information loss;
Network dynamics and strategic games in networks;
Cooperation in networks and security enhancement in cooperative networks;
Trust formation in cooperative networks;
Reputation enhancement in cooperative networks;
Recommender systems for network cooperation & network security;
Recommender systems enabling knowledge formation in networks

Last modified: 2014-11-19 11:22:57