posted by user: wmazurczyk || 5075 views || tracked by 3 users: [display]

WTMC 2016 : International Workshop on Traffic Measurements for Cybersecurity

FacebookTwitterLinkedInGoogle

Link: http://wtmc.info/
 
When May 30, 2016 - May 30, 2016
Where Xi'an, China
Submission Deadline Feb 8, 2016
Notification Due Mar 1, 2016
Final Version Due Mar 15, 2016
Categories    cybersecurity   traffic measurements   measurements   network security
 

Call For Papers

International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016)
co-located with 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016)

Workshop webpage: http://wtmc.info
Workshop location: Xi'an, China, May 30, 2016
KEYNOTE ANNOUNCED: Paul Vixie (CEO of Farsight Security, USA)

OVERVIEW
Today's world's societies are becoming more and more dependent on open networks such as the Internet - where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and numerous information security issues which are exploited by cyber criminals. The inability to provide trusted secure services in contemporary computer network technologies has a tremendous socio-economic impact on global enterprises as well as individuals. Current communication networks are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of network users, continuous appearance of network applications, increasing amount of data transferred, and diversity of user behaviors. Understanding and measuring traffic in such networks is a difficult yet vital task for network management but recently also for cybersecurity purposes. Network traffic measuring and monitoring can, for example, enable the analysis of the spreading of malicious software and its capabilities or can help to understand the nature of various network threats including those that exploit users' behavior and other user's sensitive information. On the other hand network traffic investigation can also help to assess the effectiveness of the existing countermeasures or contribute to building new, better ones. Recently, traffic measurements have been utilized in the area of economics of cybersecurity e.g. to assess ISP "badness" or to estimate the revenue of cyber criminals.

The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective.

The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches.

Topics of interest include, but are not limited to:
- Measurements for network incidents response, investigation and evidence handling
- Measurements for network anomalies detection
- Measurements for economics of cybersecurity
- Network traffic analysis to discover the nature and evolution of the cybersecurity threats
- Measurements for assessing the effectiveness of the threats detection/prevention methods and countermeasures
- Novel passive, active and hybrid measurements techniques for cybersecurity purposes
- Traffic classification and topology discovery tools for monitoring the evolving status of the network from the cybersecurity perspective
- Correlation of measurements across multiple layers, protocols or networks for cybersecurity purposes
- Novel visualization approaches to detect network attacks and other threats
- Analysis of network traffic to provide new insights about network structure and behavior from the security perspective
- Measurements of network protocol and applications behavior and its impact on cybersecurity and users' privacy
- Measurements related to network security and privacy


SUBMISSIONS AND REGISTRATION
Papers will be accepted based on peer review (3 per paper) and should contain original, high quality work. All papers must be written in English.

Authors are invited to submit their papers via Easychair. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions must be in double-column ACM SIG Proceedings format (download here), and should not exceed 12 pages. Position papers and short papers of 5 pages describing the work in progress are also welcome. Only pdf files will be accepted.

Submission page: https://easychair.org/conferences/?conf=wtmc2016

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference.

Accepted papers will be published by ACM Press as conference proceedings and in the ACM Digital Library. Extended versions of selected papers accepted for WTMC will be published in a special issue of the EURASIP Journal on Information Security. The decision will depend on the quality of the paper and quality of the presentation at WTMC. The final decision will be made by co-chairs after the workshop.

IMPORTANT DATES

February 8, 2016 Regular Paper Submission (EXTENDED DEADLINE)
March 1, 2016: Notification Date
March 15, 2016: Camera-Ready Paper Deadline

ORGANIZING COMMITTEE
Maciej KorczyƄski, Delft University of Technology, The Netherlands
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Katsunari Yoshioka, Yokohama National University, Japan
Michel van Eeten, Delft University of Technology, The Netherlands
William Robertson, Northeastern University, USA

CONTACTS

Contact WTMC 2015 Chair using this email address: chairs@wtmc.info.

Related Resources

CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
WTMC 2025   10th International Workshop on Traffic Measurements for Cybersecurity
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
IMC 2025   ACM Internet Measurement Conference 2025 (cycle 2)
IEEE-EI/Scopus-ASENS 2025   2025 2nd International Conference on Algorithms, Software Engineering and Network Security-IEEE Xplore/EI/Scopus
ISDFS 2025   13th International Symposium on Digital Forensics and Security
TRS 2025   Transportation Research Symposium
ICITA 2025   19th International Conference on Information Technology and Applications
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2