| |||||||||||||||
WTMC 2022 : IEEE Euro S&P 2020 5th International Workshop on Traffic Measurements | |||||||||||||||
Link: https://wtmc.info/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
IEEE Euro S&P 2020 5th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2020).
Genova, Italy Monday, June 15, 2020 https://wtmc.info/ After four highly successful editions of the WTMC workshop at IEEE S&P 2019, ACM SIGCOMM 2018, IEEE S&P 2017 and ACM ASIACCS 2016, we are happy to announce the 5th edition of WTMC at IEEE Euro S&P 2020. The goal of the WTMC workshop is to present some of the most relevant ongoing research in cybersecurity as seen from the network traffic measurement perspective. Accepted papers will be published through IEEE Xplore in a volume accompanying the main IEEE Euro S&P conference proceedings. Extended versions of all accepted papers will be considered for publication in a special issue of the Journal of Cyber Security and Mobility (River Publishers, ISSN: 2245-1439) WTMC will offer a number of travel grants supported by the Grenoble Alpes Cybersecurity Institute (https://cybersecurity.univ-grenoble-alpes.fr) to the students who will be presenting their work at the workshop as well as attendees from minority groups. More details (application procedures and deadlines) are to be provided soon. + February 29, 2020: Paper Submission + April 10, 2020: Notification Date + April 24, 2020: Camera-Ready Paper Deadline ***Call for Papers*** Current communication networks are increasingly becoming pervasive, complex, and ever-evolving due to factors like enormous growth in the number of network users, continuous appearance of network applications, increasing amount of data transferred, and diversity of user behaviors. Understanding and measuring traffic in such networks is a difficult yet vital task for network management but recently also for cybersecurity purposes. Network traffic measuring and monitoring can, for example, enable the analysis of the spreading of malicious software and its capabilities or can help to understand the nature of various network threats including those that exploit users' behavior and other user's sensitive information. On the other hand network traffic investigation can also help to assess the effectiveness of the existing countermeasures or contribute to building new, better ones. Recently, traffic measurements have been utilized in the area of economics of cybersecurity, e.g., to assess ISP "badness" or to estimate the revenue of cyber criminals. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective. The workshop will be accessible to both non-experts interested in learning about this area and experts interesting in hearing about new research and approaches. Topics of interest include, but are not limited to: + Measurements for network incidents response, investigation and evidence handling + Measurements of cyber attacks (e.g. DDoS, botnet, malware and phishing campaigns) + Measurements for security of web-based applications and services (e.g. social networking) + Measurements for network anomalies detection + Measurements for economics of cybersecurity and privacy + Measurements of security and privacy for the Internet of Things + Measurements of Internet censorship + Measurement studies describing impacts of regulations on cybersecurity and users' privacy (e.g. GDPR) + Network traffic analysis to discover the nature and evolution of the cybersecurity threats + Measurements of cyber physical systems security + Measurements for assessing the effectiveness of the threats detection/prevention methods and countermeasures + Novel passive, active and hybrid measurements techniques for cybersecurity purposes + Traffic classification and topology discovery tools for monitoring the evolving status of the network from the cybersecurity perspective + Correlation of measurements across multiple layers, protocols or networks for cybersecurity purposes + Machine learning and data mining for analysis of network traffic measurements for cybersecurity + Novel approaches for large-scale measurements for cybersecurity (e.g. crowd-sourcing) + Novel visualization approaches to detect network attacks and other threats + Analysis of network traffic to provide new insights about network structure and behavior from the security perspective + Measurements of network protocol and applications behavior and its impact on cybersecurity and users' privacy + Vulnerability notifications + Measurements for new cybersecurity settings + Ethical issues in measurements for cybersecurity + Reappraisal of previous empirical findings ***Submission Instructions*** Papers will be accepted based on peer review (3-4 per paper) and should contain original, high quality work. All papers must be written in English. Authors are invited to submit regular papers (maximum 10 pages) and short papers (maximum 6 pages) including references and appendices via EasyChair. Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template we supply eurosp-2020-template.zip. We suggest you first compile the supplied LaTeX source as is, checking that you obtain the same PDF as the one supplied, and then write your paper into the LaTeX template, replacing the boilerplate text. Please do not use other IEEE templates. Failure to adhere to the page limit and formatting requirements can be grounds for rejection. Papers describing cybersecurity measurement studies should include an ethical considerations paragraph, and where applicable reach out to their institutional ethics committee or institutional review board. For guidance see the Menlo Report and its companion document. Authors are encouraged to share developed software implementations, measurement datasets, simulation models, etc. used in articles allowing other researchers to build upon and extend current results. Authors may include a paragraph about reproducible research. Submission page: https://easychair.org/conferences/?conf=wtmc2020 Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. ***Workshop Co-Chairs*** + Maciej KorczyĆski - Grenoble Institute of Technology, France + Wojciech Mazurczyk - Warsaw University of Technology, Poland + Pedro Casas - Austrian Institute of Technology, Austria ***Steering Committee*** + Christian Rossow, Saarland University, Germany + Roya Ensafi, University of Michigan, USA + Kensuke Fukuda, National Institute of Informatics, Japan + Aiko Pras, University of Twente, the Netherlands |
|