posted by user: wmazurczyk || 4461 views || tracked by 7 users: [display]

IWNS 2010 : Second International Workshop on Network Steganography

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/workshop
 
When Nov 4, 2010 - Nov 6, 2010
Where Nanjing, China
Submission Deadline May 30, 2010
Notification Due Jun 15, 2010
Final Version Due Jul 10, 2010
Categories    steganography   security   covert channels   information hiding
 

Call For Papers

**************************************************************************

Second International Workshop on Network Steganography - IWNS 2010
November 4-6, 2010, Nanjing, China
co-located with
The 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010)

http://stegano.net/workshop

**************************************************************************


Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data
transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of
network protocols and mechanisms, and are expected to be used in secret
communication or information sharing. Now, it becomes a hot topic due to
the wide spread of information networks, e.g., multimedia service
networks and social networks.

This year's workshop's main theme is network anomaly detection.

The workshop is dedicated to capture such areas of research as steganography,
steganalysis, and digital forensics in the meaning of network covert channels,
investigate the potential applications, and discuss the future research topics.
Research themes of the workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues related to network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography
and steganalysis
- New methods for detecting and eliminating network steganography


PAPER SUBMISSION AND PUBLICATION

Papers will be accepted based on peer review and should contain
original, high quality work. All papers must be written in English. A
paper should not exceed 5 pages (two columns IEEE format), including
figures and references with 10-12 point font.

Submission page: TBA

The papers will be published by IEEE Computer Society Press, available
in the conference, and indexed by EI Compendex and ISTP. All published
papers will be included in the IEEE Xplore database.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of some journal.

DATES

Manuscript Due: Extended to May 30, 2010 (extended)
Acceptance Notification: June 15, 2010
Registration Due: July 10, 2010
Final Manuscript Due: July 10, 2010

WORKSHOP CHAIRS

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

ASONAM 2020   The 2020 IEEE/ACM International Conference on. Advances in Social Networks Analysis and Mining
SP 2020   IEEE Symposium on Security and Privacy
CANS 2020   Cryptology and Network Security
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
ICINT--Ei Compendex & Scopus 2020   2020 5th International Conference on Information and Network Technologies (ICINT 2020)--Ei Compendex & Scopus
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
CUING 2020   Criminal Use of Information Hiding
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)