INVITATION:
=
Please, consider to contribute to and/or forward to the appropriate groups the
following opportunity to submit and publish
original scientific results to ICIMP 2012.
The submission deadline is extended to January 16, 2012.
In addition, authors of selected papers will be invited to submit extended
article versions to one of the IARIA Journals:
http://www.iariajournals.org
=
== ICIMP 2012 | Call for Papers ===
CALL FOR PAPERS, TUTORIALS, PANELS
ICIMP 2012, The Seventh International Conference on Internet Monitoring and
Protection
May 27 - June 1, 2012 - Stuttgart, Germany
General page: http://www.iaria.org/conferences2012/ICIMP12.html
Call for Papers: http://www.iaria.org/conferences2012/CfPICIMP12.html
- regular papers
- short papers (work in progress)
- posters
- ideas
Submission page: http://www.iaria.org/conferences2012/SubmitICIMP12.html
Submission deadline: January 16, 2012
Sponsored by IARIA, www.iaria.org
Extended versions of selected papers will be published in IARIA Journals:
http://www.iariajournals.org
Please, note the Poster and Work in Progress options.
The topics suggested by the conference can be discussed in term of concepts,
state of the art, research, standards,
implementations, running experiments, applications, and industrial case
studies. Authors are invited to submit complete
unpublished papers, which are not under review in any other conference or
journal in the following, but not limited to,
topic areas.
All tracks are open to both research and industry contributions, in terms of
Regular papers, Posters, Work in progress,
Technical/marketing/business presentations, Demos, Tutorials, and Panels.
Before submission, please check and comply with the Editorial rules:
http://www.iaria.org/editorialrules.html
ICIMP 2012 Topics (topics and submission details: see CfP on the site)
TRASI: Internet traffic surveillance and interception
Methods and context to classify legal and illegal traffic; Methods and
procedure to classify wanted and undesired
traffic; Overloads, attacks, and failures; Detection of attacks via protocols
and applications; Undesired traffic
evaluation; Traffic identification caused by malicious code (spam, virii, and
worms, etc.); Traffic profile during
disaster recovery; Traffic during active emergency services; Early warning on
growing undesired traffic; Access control
and audit detection points; Denial of service; Spoofing; Lawful interception;
Multi-modal undesired traffic detection;
Measurements and data mining correlation; Countermeasures on undesired traffic
IPERF: Internet performance
Performance-oriented design; Active and passive performance monitoring;
Performance metrics and measurements;
Measurement-based performance evaluation in Internet; System measurement and
monitoring; Performance model verification
and validation; Stochastic modeling (queues, Petri nets, etc.); Statistical
performance; Performance of Internet routing;
Performance optimization; Internet performance prediction; Internet performance
evaluation studies; Internet performance
testbeds; Performance evaluation of Web search engines; Performance evaluation
of P2P systems
RTSEC: Security for Internet-based real-time systems
Security and availability of Web Services; Security/Performance trade-off;
Distributed systems security; Language-based
security; Formalisms for security and protocol verification; Performance on
firewall protected real-time systems; Security
management in real-time systems; Metrics and techniques for security risk
assessment; Internet monitoring and response
security service; Protecting emergency communications from misuse and
exploitation; Maintaining security in the face of
disaster; Intrusion prevention and detection systems; Secure networks from
web-based threats
DISAS: Disaster prevention and recovery
Survivable networks on chips; Intrusion detection and defense; Alerting
systems based on outstanding network events;
Recovery methods in various networks; Disaster diagnosis and continuity plans;
Fighting mechanisms for disaster of
networks and applications; Global positioning systems; Vehicle localization and
navigation systems; Disaster relief
agencies to perform recovery operations; Survivability-driven defense and
do-it-yourself disaster recovery; Security
during disaster recovery; Budgeting disaster recovery; Networks emergency
services; Reliable emergency communications and
applications; Response to the networks emergency services; Disaster prevention
and recovery; Fighting mechanisms for
disaster of networks and applications; Networks resiliency methods; Recovery in
various networks; Theory on robust
networks; Customer protection and serviceability perception; Cost models and
business impact; Cultural and legal aspects;
Future advanced network development and evolution; Standards and guidelines;
Lawf