dmanet@zpr.uni-koeln.de
To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de
You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de
When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."
Today's Topics:
1. [LAST Call for Papers] IEEE:: Second InfoSec2015 South Africa
(Hazel Ann)
2. First Call for Tutorials: AAMAS 2016 - 15th International
Conference on Autonomous Agents and Multiagent Systems
(Singapore) (Adrian Pearce)
3. Faculty members, Engineering Systems and Design, SUTD
(Giacomo Nannicini)
4. FPS 2015 Call for Participation (Registration ends October
19, 2015) (Joaquin Garcia-Alfaro)
----------------------------------------------------------------------
Message: 1
Date: Fri, 16 Oct 2015 22:25:32 +0800
From: Hazel Ann <hazel.sdiwc@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] [LAST Call for Papers] IEEE:: Second InfoSec2015
South Africa
Message-ID: <562108DC.7090803@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
The submission is open until October 25, 2015. Please consider
submitting your papers to InfoSec2015.
****ALL registered papers will be submitted to IEEE for POTENTIAL
inclusion to IEEE Xplore.****
=================================================================================================
The Second International Conference on Information Security and Cyber
Forensics (InfoSec2015)
November 15-17, 2015 » Cape Town, South Africa
University of Cape Town
http://sdiwc.net/conferences/infosec2015/
All registered papers will be submitted to IEEE for potential inclusion
to IEEE Xplore
====================================================
Dates
Submission Deadline Open from now until October 25, 2015
Notification of Acceptance November 2, 2015
Camera Ready Submission Open from now until November 05, 2015
Registration Deadline Open from now until November 05, 2015
Conference Dates November 15-17, 2015
====================================================
The conference welcomes papers on the following (but not limited to)
research topics:
***Cyber Security***
-Distributed and Pervasive Systems Security
-Enterprise Systems Security
-Formal Methods Application in Security
-Hardware-Based security
-Incident Handling and Penetration Testing
-Legal Issues
-Multimedia and Document Security
-Operating Systems and Database Security
-Privacy issues
-SCADA and Embedded systems security
-Secure Software Development, Architecture and Outsourcing
-Security for Future Networks
-Security in Cloud Computing
-Security in Social Networks
-Security of Web-based Applications and Services
-Security protocols
-VOIP, Wireless and Telecommunications
-Network Security
***Digital Forensic***
-Anti-Forensics and Anti-Forensics Techniques
-Cyber-Crimes
-Data leakage, Data protection and Database forensics
-Evidentiary Aspects of Digital Forensics
-Executable Content and Content Filtering
-File System and Memory Analysis Multimedia Forensic
-Forensics of Virtual and Cloud Environments
-Information Hiding
-Investigation of Insider Attacks
-Large-Scale Investigations
-Malware forensics and Anti-Malware techniques
-Network Forensics and Traffic Analysis Hardware Vulnerabilities and
Device Forensics
-New threats and Non-Traditional approaches
***Information Assurance and Security Management***
-Business Continuity & Disaster Recovery Planning
-Corporate Governance
-Critical Infrastructure Protection
-Decidability and Complexity
-Digital Rights Management and Intellectual Property Protection
Economics of Security
-Fraud Management
-Identity Management
-Laws and Regulations
-Security Policies and Trust Management
-Threats, Vulnerabilities, and Risk Management
***Cyber Peacefare and Physical Security***
-Authentication and Access Control Systems
-Biometrics Applications
-Biometrics standards and standardization
-Cyber Peacefare Trends and Approaches
-Electronic Passports, National ID and Smart Card Security
-New theories and algorithms in biometrics
-Social engineering
-Surveillance Systems
-Template Protection and Liveliness detection
------------------------------
Message: 2
Date: Sat, 17 Oct 2015 07:35:57 +0000
From: Adrian Pearce <adrianrp@unimelb.edu.au>
To: "DMANET@zpr.uni-koeln.de" <DMANET@zpr.uni-koeln.de>
Subject: [DMANET] First Call for Tutorials: AAMAS 2016 - 15th
International Conference on Autonomous Agents and Multiagent Systems
(Singapore)
Message-ID:
<BEA23E2DFDE19E41B10F68DAB5AA9502014FDD7069@000S-EX-MBX-QS4.unimelb.edu.au>
Content-Type: text/plain; charset="us-ascii"
** FIRST CALL FOR TUTORIALS **
XV International Conference on
AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS 2016)
Singapore
May 9-13, 2016
http://sis.smu.edu.sg/aamas2016
The AAMAS 2016 Organizing Committee invites proposals for the Tutorial Program, to be held on 9-10, immediately before the technical conference. AAMAS 2016 Tutorials should serve one or more of the following objectives:
* Introduce novices to major topics of AAMAS research.
* Provide instruction in established practices and methodologies.
* Survey a mature area of AAMAS research or practice.
* Motivate and explain an AAMAS topic of emerging importance.
* Introduce expert non-specialists to an AAMAS area.
* Survey an area of agent research especially relevant for people from industry
* Present a novel synthesis combining distinct lines of AAMAS work.
* Introduce AAMAS audiences to an external topic that can motivate or use AAMAS research.
Topic areas of interest include all of those listed in the call for the technical track (see http://sis.smu.edu.sg/aamas2016), including the special tracks on robotics, virtual agents, and innovative applications.
SUBMISSION REQUIREMENTS
Those interested in presenting a tutorial should register their interest on an online form (see below) and submit a proposal to the AAMAS-16 Tutorial Co-chairs, David Pynadath and Sebastian Sardina. Proposals should be two to four pages in length, and should contain the following information:
A short title of the tutorial.
A one paragraph brief description of the tutorial, suitable for inclusion in the conference registration brochure.
Preferred length for the tutorial (half day or full day).
Characterization of the potential target audience for the tutorial, including prerequisite knowledge.
A description of why the tutorial topic would be of interest to a substantial part of the AAMAS audience.
A detailed outline of the tutorial.
A brief resume of the presenter(s), which should include:
name, postal address, phone numbers, email address; background in the tutorial area, any available example of work in the area (ideally, a published tutorial-level article on the subject); evidence of teaching/presentation experience (including references that address the proposer's presentation skills as applicable); and evidence of scholarship in the area.
The name and e-mail address of the corresponding presenter. The corresponding presenter should be available for e-mail correspondence during the evaluation process, in the case clarifications and discussions on the scope and content of the proposal are needed.
The evaluation of the proposal will take into account the level of general interest for AAMAS attendees, the quality of the proposal, and the expertise and skills of the presenters. We emphasize that the primary criteria for evaluation will be whether a proposal is interesting, well-structured, and motivated, rather than the perceived experience/standing of the proposer.
Those submitting a proposal should keep in mind that tutorials are intended to provide an overview of the field; they should present reasonably well established information in a balanced way. Tutorials should not be used to advocate a single avenue of research, nor should they promote a product.
The selection of the tutorials to be included in the final AAMAS program will be based upon a number of factors, including: the scientific/technical interest of the topics, the quality of the proposal, the need to avoid strictly overlapping tutorials, and the unavoidable need to limit the overall number of selected tutorials.
RESPONSIBILITIES (with respect to accepted proposals)
AAMAS will be responsible for:
* Providing logistic support and a meeting place for the tutorial.
* Together with the organizers, determining the tutorial date and time.
* Duplicating tutorial material and distributing them to the participants.
Tutorial organizers will be responsible for:
* Providing AAMAS with a legible PDF copy of their tutorial notes by March, 4, 2016.
* Providing a web-site for the tutorial, which includes title and abstract of the tutorial, presenters' details, outline, tutorial notes and related reading material.
* Presenting the tutorial at AAMAS 2016.
AAMAS reserves the right to cancel any tutorial if the above responsibilities are not fulfilled, if deadlines are missed, or if too few attendees register for the tutorial to support the costs of running the tutorial.
IMPORTANT DATES
December 1, 2016: Tutorial Proposal Submission Deadline December 20, 2016: Tutorial Acceptance Notifications March 19, 2016: Deadline for submitting tutorial notes May 9-10, 2016: Tutorial Forum Presentations
SUBMISSIONS AND INQUIRIES
Those interested in presenting a tutorial should:
Register their interest and proposal at http://tinyurl.com/aamas16tutorials
Submit the full proposal to the AAMAS-16 Tutorial Co-chairs, David Pynadath and Sebastian Sardina by email (in ASCII or pdf).
Inquiries should be sent by email (in ASCII or pdf) to the tutorials chairs:
David V. Pynadath
Institute for Creative Technologies
University of Southern California
pynadath@usc.edu
Sebastian Sardina
School of Computer Science and Information Technology RMIT University sebastian.sardina@rmit.edu.au
------------------------------
Message: 3
Date: Sat, 17 Oct 2015 13:41:04 +0200
From: Giacomo Nannicini <giacomo.n@gmail.com>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] Faculty members, Engineering Systems and Design,
SUTD
Message-ID:
<CAFy=0d37vG2waJ2v7ydhABpeDefuhf0CROGSqLtdtiTCqXZe_g@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
The Singapore University of Technology and Design (SUTD), established
in collaboration with the Massachusetts Institute of Technology (MIT),
is seeking exceptional faculty members at all ranks (tenure-track and
tenured, including senior faculty) in the areas of Engineering Systems
and Design. SUTD, the first university in the world with a focus on
design accomplished through an integrated multi-disciplinary
curriculum, has a mission to advance knowledge and nurture technically
grounded leaders and innovators to serve societal needs. SUTD is
characterized by a breadth of intellectual perspectives (the
"university"), a focus on engineering foundations ("technology") and
an emphasis on innovation and creativity (design). The University's
programs are based on four pillars, each leading to a separate degree
program, with Engineering Systems and Design one of the four.
MIT's multi-faceted collaboration with SUTD includes curriculum
development and initial course deployment, faculty and student
recruiting, mentoring, and career development, and collaboration on
joint research projects, through a major new international design
centre, funding opportunities, and student exchanges. Professor Thomas
Magnanti, former Dean of Engineering at MIT (and former President of
INFORMS), is the Founding President of SUTD. Saif Benjaafar,
Distinguished McKnight University Professor and former Director of
Industrial & Systems Engineering at the University of Minnesota, was
the Founding Head of the Pillar of Engineering Systems and Design.
We seek individuals with an earned doctorate (or nearing completion)
in an engineering systems-related field, including operations
research, operations management, industrial engineering, applied
mathematics and statistics, economics and public policy. Individuals
with research interests in large scale and complex systems, including,
but not limited to, supply chains, transportation and logistics,
healthcare, energy and the environment, service systems, critical
infrastructure, and security, are particularly encouraged to apply.
Applicants must have a solid grounding in one or more methodologies,
including, but not limited to, optimization, stochastic modeling,
statistics, network science, game theory, system dynamics,
econometrics and behavioral sciences. Applicants should have a strong
commitment to teaching at the undergraduate and graduate levels, to
mentoring and advising of undergraduate and graduate students, and to
developing and maintaining an active research program.
Candidates should submit a letter of interest, a CV, sample
publications, statements of research and teaching interests, and three
letters of reference. Applications are being accepted online at
www.sutd.edu.sg/careers.htm. Additional information about the
university and the engineering systems and design pillar can be found
at www.sutd.edu.sg. Inquiries about the position can be directed to
Associate Professor Karthik Natarajan (karthik_natarajan@sutd.edu.sg),
Associate Head of the Pillar of Engineering Systems and Design. If you
will be at INFORMS, please drop a mail towards this.
------------------------------
Message: 4
Date: Sat, 17 Oct 2015 14:59:04 +0200
From: Joaquin Garcia-Alfaro
<joaquin.garcia_alfaro@telecom-sudparis.eu>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] FPS 2015 Call for Participation (Registration ends
October 19, 2015)
Message-ID: <56224618.8030604@telecom-sudparis.eu>
Content-Type: text/plain; charset=UTF-8; format=flowed
CALL FOR PARTICIPATION
======================
*********************************************************************
8th International Symposium on Foundations & Practice of Security
(FPS 2015), Clermont-Ferrand, France, 26-28 October 2015.
*********************************************************************
** Registration ends October 19, 2015 **
ABOUT THE CONFERENCE
====================
The Foundations & Practice of Security (FPS) Symposium started as a
Franco-Canadian meeting sponsored by MITACS, INRIA and Institut
Mines-Telecom, and has since 2011 grown to be an international event
on its own. After the previous meetings held in La Rochelle, Montreal,
Grenoble, Toronto and Paris, this 8th edition of the FPS symposium
will be held in Clermont-Ferrand, France.
The aim of FPS is to discuss and exchange theoretical and practical
ideas that address security issues in inter-connected systems. It aims
to provide scientific presentations as well as to establish links,
promote scientific collaboration, joint research programs, and student
exchanges between institutions involved in this important and fast
moving research field.
PROGRAM
=======
MONDAY October 26
10:00 - 10:30 Welcome Coffee
10:30 - 11:00 Opening & Symposium Information
11:00 - 12:00 Keynote Talk
Optimization Problems in Infrastructure Security.
By Evangelos Kranakis (Carleton University, Ottawa, Canada).
12:00 - 14:00 Lunch
14:00 - 15:30 Session 1: RFID, Sensors & Secure Computation
- Survey of Distance Bounding Protocols and threats.
By Agnès Brelurut and Pascal Lafourcade.
- Inferring Touch From Motion in Real World Data.
By Pascal Bissig, Philipp Brandes, Jonas Passerini and Roger
Wattenhofer.
- Point-counting method for embarrassingly parallel evaluation in
secure computation.
By Toomas Krips and Jan Willemson.
15:30 - 16:00 Coffee Break
16:00 - 17:15 Session 2: Short Papers I
- Security Enforcement by Rewriting: An Algebraic Approach (short
paper).
By Guangye Sui and Mohamed Mejri.
- Runtime Monitoring of Stream Logic Formulae (short paper).
By Sylvain Halle and Raphael Khoury.
- MIME - A Formal Approach for Multiple Investigation in (Android)
Malware Emulation Analysis (short paper).
By Fabio Bellini, Roberto Chiodi and Isabella Mastroeni.
17:15 - 17:20 Closing Remarks Day 1
TUESDAY October 27
08:30 - 16:00 Registration
09:00 - 10:00 Keynote Talk
Secure distributed computation on private inputs.
By David Pointcheval (Ecole Normale Superieure, Paris, France).
10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 3: Security Policies & Biometrics
- Security mechanisms planning to enforce security policies.
By Anis Bkakria, Frederic Cuppens, Nora Cuppens-Boulahia and
David Gross-Amblard.
- Runtime Enforcement With Partial Control.
By Raphael Khoury and Sylvain Halle.
- Privacy-preserving fuzzy commitment for biometrics via layered
error-correcting codes.
By Yasuda Masaya, Takeshi Shimoyama, Narishige Abe, Shigefumi
Yamada, Takashi Shinzaki and Takeshi Koshiba.
12:00 - 14:00 Lunch
14:00 - 15:15 Session 4: Short Papers II
- Information Classification Enablers (short paper).
By Erik Bergstrom and Rose-Mharie Ã…hlfeldt.
- Information Flow Control on a Multi-Paradigm Web Application for
SQL Injection Prevention (short paper).
By Meriam Talbi, François Lesueur and Gaetan Perrin.
- Searchable Encryption in Apache Cassandra (short paper).
By Tim Waage, Ramaninder Singh Jhajj and Lena Wiese.
15:15 - 15:30 FPS 2016 announcement
15:30 - 16:00 Coffee & End Day 2
17:00 - 22:00 Visit Old Clermont-Ferrand (place Jaude) & Banquet
WEDNESDAY October 28
09:00 - 10:30 Session 5: Evaluation of Protocols and Obfuscation Security
- AnBx: Automatic Generation and Verification of Security
Protocols Implementations.
By Paolo Modesti.
- Performance Evaluations of Cryptographic Protocols. Verification
Tools Dealing with Algebraic Properties.
By Pascal Lafourcade and Maxime Puys.
- Evaluating Obfuscation Security: A Quantitative Approach.
By Rabih Mohsen and Alexandre Pinto.
10:30 - 11:00 Coffee Break
11:00 - 12:15 Session 6: Short Papers III
- AndroSSL: A Platform to Test Android Applications Connection
Security (short paper).
By François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier,
Simon Desloges, Jonathan Ouellet and Catherine Boileau.
- Onion Routing in Deterministic Delay Tolerant Networks (short paper).
By Adrian Antunez-Veas and Guillermo Navarro-Arribas.
- Improving electromagnetic leakage planar cartography with
frequency or distance analysis (short paper).
By Denis Real.
12:10 - 14:00 Lunch
14:00 - 15:30 Session 7: Spam Emails & Malware
- Fast and Effective Clustering of Spam Emails based on Structural
Similarity.
By Mina Sheikhalishai, Andrea Saracino, Mohamed Mejri, Nadia Tawbi
and Fabio Martinelli.
- A Closer look at the HTTP and P2P based Botnets from a
Detector's Perspective.
By Fariba Haddadi and A. Nur Zincir-Heywood.
- Obfuscation code localization based on CFG generation of malware.
By Minh Hai Nguyen, Mizuhito Ogawa and Tho Quan Thanh.
15:30 - 16:00 Farewell & Coffee
REGISTRATION
============
Registration information is available at:
http://confiance-numerique.clermont-universite.fr/fps2015/registration.html
Registration ends 19 October 2015.
HOTEL AND TRAVEL
================
Information on the conference venue is available at:
http://confiance-numerique.clermont-universite.fr/fps2015/venue.html
MORE INFORMATION
================
Additional information about the conference is available at:
http://confiance-numerique.clermont-universite.fr/fps2015/
------------------------------
Subject: Digest Footer
_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
------------------------------
End of dmanet Digest, Vol 92, Issue 15
**************************************
No comments:
Post a Comment