posted by user: myjianxin || 3961 views || tracked by 10 users: [display]

IPDS 2011 : IPDS 2011: The First International Workshop for Innovative Methods for Intrusion Prevention and Detection Systems


When Feb 23, 2011 - Feb 28, 2011
Where Gosier, Guadeloupe, France
Submission Deadline Oct 15, 2010
Notification Due Nov 20, 2010
Final Version Due Dec 20, 2010
Categories    network security   intrusion prevention   distributed system

Call For Papers


IPDS 2011: The First International Workshop for Innovative Methods for Intrusion Prevention and Detection Systems

- along with ICDS 2011, The Fifth International Conference on Digital Society
- under DigitalWorld 2011 umbrella

Submission page:

Submission deadline: October 15, 2010

Sponsored by IARIA,
Technically co-sponsored by University of Derby, UK

Extended versions of selected papers will be published in IARIA Journals:
Please note the Poster Forum and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and comply with the Editorial rules:

ASPEN 2011 Topics (for submission details: see CfP on the site)
• Reducing false positives and improving true positives
• Automating IPDS responses
• Innovative signature writing and processing
• Improving IPDS usability
• Successful approaches to Anomaly IPDS (Statistical; Fuzzy logic; Bayesian; Neural networks, etc.)
• Inventive behavioural based IPDS methods
• Inventive host based IPDS methods
• Improving the performance of IPDS
• Multiple sensor IPDS
• Tuning IPDS
• The business cases supporting IPDS
• Network traffic normalization techniques
• Cost/Benefit of IPDS
• Combining IPDS with other hardware e.g. firewalls, routers etc.
• Inventive methods of using IPDS to counter specific attack types (Web attacks; Buffer overflow attacks; Brute force attacks, etc.)
• Comparisons of different IPDS mechanisms
• Combining multiple IPDS approaches

IPDS 2011 Chairs
David Day, University of Derby, UK
Jianxin Li, Beihang University, China

IARIA Committees Board Chair
Petre Dini, Concordia University, Canada / IARIA
IPDS 2011 Technical Program Committee
David Day, University of Derby UK
Richard Hill, University of Derby, UK
Harjinder Lallie, University of Derby, UK
Jianxin Li, Beihang University, China
Lu Liu, University of Derby, UK
Simon Polovina, Sheffield Hallam University, UK
Ann Reddipogu, ManyWorlds UK Ltd, UK
Dharam Shadija, Sheffield Hallam University, UK
Ashley Thomas, SecureWorks, USA
Richard Thorne, Victoria University, Australia
Dave Voorhis, University of Derby, UK
Zhengxu Zhao, Shijiazhuang Tiedao University, China
Dr Rongbo Zhu, South Centre University for Nationalities, China

Related Resources

BTSD 2020   The 2nd International Workshop on Big Data Tools, Methods, and Use Cases for Innovative Scientific Discovery (BTSD) 2020
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
FM 2021   Formal Methods 2021
IEEE-EI/SCOPUS-CCISP 2020   The 5th International Conference on Communication, Image and Signal Processing (CCISP 2020)
Fintech 2020   Sustainaility (Q2): Fintech: Recent Advancements in Modern Techniques, Methods and Real-World Solutions
CTCM 2020   6th International Conference of Control Theory and Computer Modelling
MLTIIDS 2020   Special Issue on Machine Learning Techniques for Intelligent Intrusion Detection Systems
PAM 2021   Passive and Active Network Measurement
ICPRAM 2021   10th International Conference on Pattern Recognition Applications and Methods
CISNS-Ei Compendex/Scopus 2020   2020 International Conference on Information System and Network Security