Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    ICIMP 2010 - The Fifth International Conference on Internet Monitoring and Protection

    View: 1605

    Website www.iaria.org/conferences.html | Want to Edit it Edit Freely

    Category ICIMP 2010

    Deadline: December 20, 2009 | Date: May 09, 2010

    Venue/Country: Barcelona, Spain

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    The International Conference on Internet Monitoring and Protection (ICIMP 2010) continues a series of special events targeting security, performance, vulnerabilities in Internet, as well as disaster prevention and recovery. Dedicated events focus on measurement, monitoring and lessons learnt in protecting the user.

    The design, implementation and deployment of large distributed systems are subject to conflicting or missing requirements leading to visible and/or hidden vulnerabilities. Vulnerability specification patterns and vulnerability assessment tools are used for discovering, predicting and/or bypassing known vulnerabilities.

    Vulnerability self-assessment software tools have been developed to capture and report critical vulnerabilities. Some of vulnerabilities are fixed via patches, other are simply reported, while others are self-fixed by the system itself. Despite the advances in the last years, protocol vulnerabilities, domain-specific vulnerabilities and detection of critical vulnerabilities rely on the art and experience of the operators; sometimes this is fruit of hazard discovery and difficult to be reproduced and repaired.

    System diagnosis represent a series of pre-deployment or post-deployment activities to identify feature interactions, service interactions, behavior that is not captured by the specifications, or abnormal behavior with respect to system specification. As systems grow in complexity, the need for reliable testing and diagnosis grows accordingly. The design of complex systems has been facilitated by CAD/CAE tools. Unfortunately, test engineering tools have not kept pace with design tools, and test engineers are having difficulty developing reliable procedures to satisfy the test requirements of modern systems. Therefore, rather than maintaining a single candidate system diagnosis, or a small set of possible diagnoses, anticipative and proactive mechanisms have been developed and experimented. In dealing with system diagnosis data overload is a generic and tremendously difficult problem that has only grown. Cognitive system diagnosis methods have been proposed to cope with volume and complexity.

    Attacks against private and public networks have had a significant spreading in the last years. With simple or sophisticated behavior, the attacks tend to damage user confidence, cause huge privacy violations and enormous economic losses.

    The CYBER-FRAUD track focuses on specific aspects related to attacks and counterattacks, public information, privacy and safety on cyber-attacks information. It also targets secure mechanisms to record, retrieve, share, interpret, prevent and post-analyze of cyber-crime attacks.

    Current practice for engineering carrier grade IP networks suggests n-redundancy schema. From the operational perspective, complications are involved with multiple n-box PoP. It is not guaranteed that this n-redundancy provides the desired 99.999% uptime. Two complementary solutions promote (i) high availability, which enables network-wide protection by providing fast recovery from faults that may occur in any part of the network, and (ii) non-stop routing. Theory on robustness stays behind the attempts for improving system reliability with regard to emergency services and containing the damage through disaster prevention, diagnosis and recovery.

    Highly reliable emergency communications are required by public safety and disaster relief agencies to perform recovery operations or associated with disasters or serious network events. Future advanced network development and evolution should take into consideration these requirements through solutions:

    ?Identification of suitable technologies, i.e., narrowband and broadband aspects,

    ?Interoperability and interworking between emergency communications capabilities and public networks,

    ?Preferential access to communications resources capabilities, applications, and facilities,

    ?Preferential use of remaining operational resources.

    We solicit both academic, research, and industrial contributions. ICIMP 2010 will offer tutorials, plenary sessions, and panel sessions. A best paper award will be granted by the IARIA’s award selection committee. The Advisory Committee will periodically report special events relating to our community.

    The conference has the following specialized events:

    TRASI: Internet traffic surveillance and interception

    IPERF: Internet performance

    RTSEC: Security for Internet-based real-time systems

    DISAS: Disaster prevention and recovery

    EMERG: Networks and applications emergency services

    MONIT: End-to-end sampling, measurement, and monitoring

    REPORT: Experiences & lessons learnt in securing networks and applications

    USSAF: User safety, privacy, and protection over Internet

    SYVUL: Systems vulnerabilities

    SYDIA: Systems diagnosis

    CYBER-FRAUD: Cyber fraud

    BUSINESS: Business continuity

    RISK: Risk assessment

    TRUST: Privacy and trust in pervasive communications

    RIGHT: Digital rights management

    BIOTEC: Biometric techniques

    EMDRM: Enterprise & Media DRM

    We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

    The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All tracks are open to both research and industry contributions.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.