Wednesday, August 6, 2014

dmanet Digest, Vol 78, Issue 2

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. CFP: 31 Aug 14, Special Issue of Springer Complex Adaptive
Systems Modeling Journal on Modeling Communication Networks
(Dr. Muaz Niazi)
2. CfP:[Deadline Extension] IEEE Cloud-CPS 2014 - IEEE
International Workshop on Cloud-integrated Cyber Physical Systems
2014, December 15 - 18, 2014, Singapore. (Sandra Sendra)
3. CALL FOR PARTICIPATION: CRISIS'14 (9th International
Conference on Risks and Security of Internet and Systems),
Trento, Italy, AUG 27-29 (Joaquin Garcia-Alfaro)


----------------------------------------------------------------------

Message: 1
Date: Fri, 1 Aug 2014 15:09:54 +0500
From: "Dr. Muaz Niazi" <thhgttg@gmail.com>
To: <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] CFP: 31 Aug 14, Special Issue of Springer Complex
Adaptive Systems Modeling Journal on Modeling Communication Networks
Message-ID: <014101cfad70$bf33d020$3d9b7060$@gmail.com>
Content-Type: text/plain; charset="iso-8859-1"

--Kindly forward to anyone interested?

http://www.casmodeling.com/about/update/COMM_NETS

Springer Complex Adaptive Systems Modeling?welcomes submissions to the new
thematic series on?Modeling large-scale communication networks using complex
networks and agent-based modeling techniques.
This thematic series intends to publish high quality original research as
well as review articles on case studies, models and methods for the modeling
and simulation of large-scale computer communication networks using either
of the following two approaches:
? ?Complex networks (such as modeled using tools such as Gephi, Network
Workbench and others)
? ?Agent-based models (such as based on NetLogo, Repast, Mason, Swarm and
others)
Potential topics include, but are not limited to:
? Multiagent systems
? Cognitive Sensor Networks
? Wireless Sensor Networks
? Sensor Actuator Networks
? Cloud computing infra-structures
? Internet of Things
? Service-oriented architectures
? Pervasive/Mobile Computing
? Peer-to-peer networks
Submission instructions:
Before submitting your manuscript, please ensure you have carefully read
the?Instructions for Authors?for?Complex Adaptive Systems Modeling. The
complete manuscript should be submitted through the?Complex Adaptive Systems
Modeling?submission system. To ensure that you submit to the correct
thematic series please select the appropriate section in the drop-down menu
upon submission. In addition, indicate within your cover letter that you
wish your manuscript to be considered as part of the thematic series
on?Modeling large-scale communication networks using complex networks and
agent-based modeling techniques.. All submissions will undergo rigorous peer
review and accepted articles will be published within the journal as a
collection.
Deadline for submissions: 31 August 2014
Lead guest editor:?Muaz A. Niazi,?COMSATS Institute of IT
Submissions will also benefit from the usual benefits of open access
publication:
? Rapid publication: Online submission, electronic peer review and
production make the process of publishing your article simple and efficient
? High visibility and international readership in your field: Open access
publication ensures high visibility and maximum exposure for your work -
anyone with online access can read your article
? No space constraints: Publishing online means unlimited space for figures,
extensive data and video footage
? Authors retain copyright, licensing the article under a Creative Commons
license: articles can be freely redistributed and reused as long as the
article is correctly attributed



Kind regards,
Muaz

-
Muaz A. Niazi, PhD SMIEEE
Chief Scientific Officer (Professor),
COMSATS Institute of IT, Pak.
Editor-in-Chief Springer Complex Adaptive Systems Modeling
Editor-in-Chief IGI Global IJPHIM
Email: muaz.niazi@ieee.org, niazi@alum.bu.edu
Alternate: muaz.niazi@gmail.com
-


--Apologies if you receive more than one post--




------------------------------

Message: 2
Date: Sat, 2 Aug 2014 19:18:29 +0200
From: Sandra Sendra<sandra.sendra.upv@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] CfP:[Deadline Extension] IEEE Cloud-CPS 2014 - IEEE
International Workshop on Cloud-integrated Cyber Physical Systems
2014, December 15 - 18, 2014, Singapore.
Message-ID: <201408021718.s72HISko018672@smtp.upv.es>
Content-Type: text/plain; charset=us-ascii



[Apologies, if multiple copies of this CFP are received]

CALL FOR PAPERS

IEEE Cloud-CPS 2014: IEEE International Workshop on Cloud-integrated Cyber Physical Systems 2014 (in conjunction with IEEE CloudCom 2014)
December 15 - 18, 2014, Singapore
Link: http://cloudcps.cwins.org/

=====================================================================
IMPORTANT DATES:
- Paper submissions: August 25, 2014 (extended)
- Review Notification: Sept. 20, 2014
- Deadline for camera-ready: Oct.5, 2014

=====================================================================

CALL FOR PAPERS

Technology has gone through tremendous changes in terms of computing, communications and control to provide wide range of applications in all domains. This advancement provides the opportunities to bridge the physical components/processes and the cyber space leading to the Cyber Physical Systems (CPS). The notion of CPS is to use computing (sensing, analyzing, predicting, understanding, etc.), communication (interaction, intervene, interface management, etc.) and control (inter-operate, evolve, evidence-based certification, etc.) to make intelligent and autonomous systems. Such systems are playing an increasingly prevalent and important role in this electronic era such as healthcare, manufacturing, civil infrastructure, aerospace, entertainment, transportation and many automated physical systems. Computing and networking are two major components of CPS and Cloud has infinite resources for both. Cloud-integrated CPS will not only enhance CPS itself but also process, analyze a!
nd manage (CPS) big data efficientl
y. However, there are many issues and hurdles of Cloud-integrated CPS that need discussions.

Our aim is to provide a platform for researchers and practitioners to present their research results in the area of Cloud-integrated Cyber-Physical Systems (Cloud-CPS). The proposed workshop Cloud-CPS 2014 will serve as a forum for researchers from academia, government and industries to exchange ideas, present new results and provide future visions on these topics. Topics of interest include but not limited to:

- Cloud-CPS Architecture.
- Cloud-CPS Modeling and Simulation.
- Virtualization of Physical Components in Cloud-CPS.
- Design and Performance Optimization in Cloud-CPS.
- Cloud-assisted Situation-aware and decision support.
- Big-data Processing and Visualization in Cloud-CPS.
- Mobile Cloud-CPS.
- CPS Architecture.
- Game Theory for Cloud-CPS.
- Tools and Methods for Cloud-CPS.
- Sensor-actuator Networks.
- Security, Privacy, and Trust in Cloud-CPS.
- Intelligent (Road/Air) Transportation Cloud-CPS.
- Cloud-CPS in healthcare.
- Cloud-CPS in energy.
- Fog computing.
- Cloud-CPS: Tools, test beds and deployment issues.
- Opportunistic spectrum access for Cloud-CPS.

SUBMISSION
The authors are advised to submit their research paper following the IEEE CS format: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. Paper page limit should not exceed 8 pages. Instructions for authors how to format the manuscript can be found at:

http://www.computer.org/portal/web/cscps/submission/
http://www.computer.org/portal/web/cscps/formatting/

Papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. The papers, in pdf format, should be submitted electronically through:

https://www.easychair.org/conferences/?conf=ieeecloudcps2014

If there is any problem during submission, please contact the workshop general chairs or db.rawat(at)ieee.org.

All accepted papers will be published by IEEE CS Press (submitted to IEEEXplore) and submitted for indexing by EI and ISSN.

=====================================================================


GENERAL CHAIRS
- Ivan Stojmenovic, University of Ottawa, Canada
- Danda B. Rawat, Georgia Southern University, USA
- Jaime Lloret Mauri, Polytechnic University of Valencia, Spain

PROGRAM CHAIRS
- Bhed B. Bista, Iwate Prefectural University, Japan
- Song Guo, The University of Aizu, Japan

PUBLICITY CHAIRS
- Sandra Sendra, Polytechnic University of Valencia, Spain
- Wenjia Li, Georgia Southern University, USA
=====================================================================

ADDITIONAL INFORMATION
- The list of members of the Program Committee is published on the web page of the conference.


------------------------------

Message: 3
Date: Sun, 03 Aug 2014 21:40:29 +0200
From: Joaquin Garcia-Alfaro
<joaquin.garcia_alfaro@telecom-sudparis.eu>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] CALL FOR PARTICIPATION: CRISIS'14 (9th International
Conference on Risks and Security of Internet and Systems), Trento,
Italy, AUG 27-29
Message-ID: <53DE902D.8040501@telecom-sudparis.eu>
Content-Type: text/plain; charset=UTF-8; format=flowed

[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

**********************************************************************
9th International Conference on Risks and Security of Internet
and Systems
(CRiSIS 2014)
University of Trento, Department of Sociology and Social Research
via Verdi 26, Trento, Italy
August 27th-29th, 2014

http://titan.disi.unitn.it/crisis2014/
**********************************************************************

ABOUT THE CONFERENCE

The International Conference on Risks and Security of Internet and
Systems 2014 is the ninth in a series dedicated to security challenges
related to Internet applications, networks and systems. In recent years,
the Internet has become essential for the exchange of information
between user groups and organisations from different backgrounds and
with different needs and objectives. These users are exposed to
increasing security and privacy risks, due to the development of
sophisticated on-line attacks, the growth of cyber-crime. In this
context, new security mechanisms and techniques are needed to achieve an
acceptable level of assurance for critical domains such as
transportation, health, defence, banking, critical infrastructures. The
CRiSIS conference offers an effective forum for computer and network
security researchers from industry, academia and government to meet,
exchange ideas and present recent advances on Internet-related security
threats and vulnerabilities, and o!
n the solutions that are needed to counter them.

The conference will be a 3-days event featuring technical presentations
of 20 papers an invited talk and 3 technical tutorials.


REGISTRATION

Registration and accommodation information is available at
http://titan.disi.unitn.it/crisis2014
Early registration ends on August 15th!



PRELIMINARY PROGRAM

_____________________________________________________________________________

Wednesday, August 27th 2014
----------------------

09:30 - 10:00 Registration

10:00 - 12:00 Tutorial: Online Privacy: Risks, Challenges, and New Trends
(Esma A?meur)
12:00 - 13:00 Lunch

13:00 - 15:00 Tutorial: Data Anonymization
(Josep Domingo-Ferrer & Jordi Soria Comas)
15:00 - 15:30 Break
15:30 - 17:30 Tutorial: Security of the Android Operating Systems
(Yury Zhauniarovich)
17:30 Social Event to Buonconsiglio Castle


_____________________________________________________________________________

Thursday, August 28th 2014
------------------------

9:15 ? 9:30 Opening Remarks / Registration
9:30 ? 10:30 Invited Keynote Talk
10: 30 ? 11:00 Break
11:00 ? 12:30, Session 1 ? Anomalies
11:00 ? 11:30 Detecting Anomalies in Printed Intelligence Factory Network
(Matti Mantere, Mirko Sailio and Sami Noponen)
11:30 ? 12:00 Context-Awareness using Anomaly-based Detectors for Smart
Grid Domains
(Cristina Alcaraz, Lorena Cazorla and Gerardo Fernandez)
12:00 ? 12:30 Automated detection of logical errors in programs
(George Stergiopoulos, Panagiotis Katsaros and Dimitris Gritzalis)
12:30 ? 14:00 Lunch

14:00 ? 15:00, Session 2 ? Security Technology

14:00 ? 14:30 Reversible Fragile Algorithm for Watermarking Relational
Database Based on Multilevel Histogram Modification
(Amal Hamdy, Mohamed Hashem, Amal El-Shershaby and Sawsan Shouman)
14:30 ? 15:00 Evaluation of Dynamic Instantiation in CPRM-based Systems
(Ana Nieto)
15:00 ? 15:30 Break

15:30 ? 16:30, Session 3 ? Short Papers
15:30 ? 15:50 Towards a Full Support of Obligations In XACML
(Donia Elkateb, Tejeddine Mouelhi, Yves Le Traon, Yehia ElRakaiby
and Iram Rubab)
15:50 ? 16:10 Managing Heterogeneous Access Control Models
Cross-Organization
(Samira Haguouche and Zahi Jarir)
16:10 ? 16:30 ISER: a platform for security interoperability of
multi-source systems
(Khalifa Toumi, Fabian Autrel, Ana Cavalli and Sammy Haddad)

17:00 Social Event: Visit to Garda Lake
20:00 Social Dinner: Toblino Castle



_____________________________________________________________________________

Friday, August 29th 2014
------------------------

9:00 ? 10:30, Session 4 - Privacy
9:00 ? 9:30 Privacy Issues In Geosocial Networks
(Zakaria Shahnoune, Cheu Yien Yep and Esma A?meur)
9:30 ? 10:00 SocialSpy: Browsing (Supposedly) Hidden Information in
Online Social Networks
(Giuseppe Cascavilla, Andrea Burratin and Mauro Conti)
10:00 ? 10:30 Latent Semantic Analysis for Privacy Preserving Peer Feedback
(Mouna Selmi, Hicham Hage and Esma A?meur)
10:30 ? 11:00 Break
11:00 ? 12:30, Session 5 ? Access control, policies, software
11:00 ? 11:30 Attacking Suggest Boxes in Web Applications Over HTTPS
Using Stochastic Side-Channel Algorithms
(Alexander Schaub, Emmanuel Schneider, Alexandros Hollender,
Vinicius Calasans,
Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley and
Olivier Rioul)
11:30 ? 12:00 Location-aware RBAC based on Spatial Feature Models and
Realistic Positioning
(Philipp Marcus, Lorenz Schauer and Claudia Linnhoff-Popien_
12:00 ? 12:30 Inter-Technology Conflict Analysis for Communication
Protection Policies
(Fulvio Valenza, Cataldo Basile, Daniele Canavese and Antonio Lioy)
12:30 ? 14:00 Lunch
14:00 ? 15:30, Session 6 - Attacks
14:00 ? 14:30 Two-Level Automated Approach for Defending Against
Obfuscated Zero-day Attacks
(Ratinder Kaur and Maninder Singh)
14:30 ? 15:00 Practical Attacks on Virtual Worlds
(Graham Hili, Sheila Cobourne, Keith Mayes and Konstantinos
Markantonakis)
15:00 ? 15:30 TabsGuard: A Hybrid Approach to Detect and Prevent
Tabnabbing Attacks
(Hana Fahim Hashemi, Mohammad Zulkernine and Komminist Weldemariam)
15:30 ? 16:00 Break
16:00 ? 17:00, Session 7 ? Short Papers
16:00 ? 16:20 Key Extraction Attack using Statical Analysis of Memory
Dump Data
(Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto and Yutaka Miyake)
16:20 ? 16:40 How Robust is the Internet? ? Insights from Graph Analysis
(Annika Baumann and Benjamin Fabian)
16:40 ? 17:00 Regularity Based Decentralized Social Networks
(Zhe Wang and Naftaly Minsky)



MORE INFORMATION

Additional information about the conference can be found at
http://titan.disi.unitn.it/crisis2014/
For information regarding the conference you may contact:
crisis2014@unitn.it





------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 78, Issue 2
*************************************

No comments:

Post a Comment