Thursday, February 18, 2016

dmanet Digest, Vol 96, Issue 23

Send dmanet mailing list submissions to
dmanet@zpr.uni-koeln.de

To subscribe or unsubscribe via the World Wide Web, visit
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet
or, via email, send a message with subject or body 'help' to
dmanet-request@zpr.uni-koeln.de

You can reach the person managing the list at
dmanet-owner@zpr.uni-koeln.de

When replying, please edit your Subject line so it is more specific
than "Re: Contents of dmanet digest..."


Today's Topics:

1. iFMCloud'16 *Deadline Extended*: 1st Int'l Workshop on Formal
Methods for and on the Cloud (Razieh Behjati)
2. 15 days to Proposal Deadline Security Solutions and Applied
Cryptography in Smart Grid Communications (Mohamed Amine Ferrag)
3. INTECH 2016 (Sidda)
4. AOC 2016: IEEE WoWMoM Workshop on Autonomic and Opportunistic
Communications (Antonino Masaracchia)


----------------------------------------------------------------------

Message: 1
Date: Wed, 17 Feb 2016 20:38:54 +0100
From: Razieh Behjati <behjati@simula.no>
To: dmanet <dmanet@zpr.uni-koeln.de>
Subject: [DMANET] iFMCloud'16 *Deadline Extended*: 1st Int'l Workshop
on Formal Methods for and on the Cloud
Message-ID:
<CAKTFa2-fdGEOQzghz4i1DU4vW8Gs_YqqYxxSo+7rpQwmEco7UA@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8


============================ Call for Papers =============================

iFMCloud 2016

1st International
Workshop on Formal Methods for and on the
Cloud

https://ifmcloud2016.nntb.no/

co-located with iFM 2016, 1-4 June 2016,
Reykjavik, Iceland
=====================================================================

Important Dates (*Extended*)

Abstract submission deadline: March 5, 2016 (AoE)
Paper submission deadline: March 5, 2016 (AoE)
Author notifications: April 4, 2016
Camera-ready copies: April 15, 2016
Workshop date: June 4, 2016


Keynote Speaker

Gul Agha (University of Illinois at Urbana-Champaign, USA)

Motivation

Cloud solutions are increasingly used for a plethora of purposes, including
solving memory-intensive and computation-intensive problems. Ensuring the
reliability, availability, scalability, and security of cloud solutions, as
networked distributed systems with properties such as dynamic reallocation
of resources, is a challenging problem that requires rigorous modeling,
analysis, and verification tools. Such tools can be devised using the
techniques provided by the formal methods community. On the other hand,
many
formal analysis and verification tools are memory-intensive and
computation-intensive solutions, which can benefit from the cloud
technology.


The goal of the iFMCloud workshop is to identify and better understand
challenges of using formal and semi-formal methods for modeling and
verification of Cloud-based systems and computer and communication
networks,
as well as challenges and opportunities in providing formal analysis and
verification as services on the Cloud. We aim to reach these goals by
bringing together researchers and practitioners from these, and other
related fields.


Topics

We particularly encourage position papers and experience reports, which
identify and structure open challenges and research questions. We are
interested in all topics related to synergies between the fields of formal
and semi-formal methods and the fields of cloud computing and computer and
communication networks, including but not limited to:

* Formal and semi-formal methods for modeling, analysis, and verification
of Cloud-based systems and computer and communication networks:
- Methods for analysis and design of cloud infrastructures
- Methods for analysis and design of cloud applications
- Modeling and verification of networked systems, in particular
SDN-based systems
- Runtime analysis, monitoring, and performance evaluation
* Formal analysis and verification as services on the Cloud
- Opportunities and challenges of providing formal analysis and
verification as services on the Cloud
- Distributed algorithms for analysis and verification
* Testing as a service on the Cloud
* Case studies and experience reports
* Position statements setting a research agenda for collaboration between
the formal methods community, the cloud computing community, and other
related fields


Submission guidelines

Authors are invited to submit position papers and experience reports (max 8
pages) in
EPTCS proceedings format. Submissions must be original, and will be
selected based on
the relevance to the workshop topics and the suitability to trigger
discussions. All
submissions will be reviewed by at least three members of the program
committee.
Accepted papers will be published in an EPTCS volume. Papers should be
submitted via
Easychair at:
https://easychair.org/conferences/?conf=ifmcloud16


Contact Information

To contact the organizers, please send an email to:
iFMCloud16-organizers@googlegroups.com


Organizing Committee

Razieh Behjati, Simula Research Laboratory, Norway
Ahmed Elmokashfi, Simula Research Laboratory, Norway


Program Committee

Eva Darulova, MPI-SWS, Germany
Fatemeh Ghassemi, University of Tehran, Iran
Arnaud Gotlieb, Simula Research Laboratory, Norway
Ernst Gunnar Gran, Simula Research Laboratory, Norway
Hossein Hojjat, Cornell University, USA
Geir Horn, University of Oslo, Norway
Andreas Kassler, Karlstad University, Sweden
Steven Latre, University of Antwerp - iMinds, Belgium
Meriem Ouederni, IRIT/INPT Toulouse, France
Rosario Pugliese, University of Florence, Italy
Sven-Arne Reinemo, Fabriscale Technologies, Norway
Hamideh Sabouri, Shahid Beheshti University, Iran
Jesus Escudero Sahuquillo, Technical University of Valencia, Spain
Sagar Sen, Simula Research Laboratory, Norway
Marjan Sirjani, Reykjavik University, Iceland
Martin Steffen, University of Oslo, Norway
Amirhossein Taherkordi, University of Oslo, Norway

------------------------------

Message: 2
Date: Wed, 17 Feb 2016 17:37:19 -0500
From: Mohamed Amine Ferrag <maferrag@lrs-annaba.net>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] 15 days to Proposal Deadline Security Solutions and
Applied Cryptography in Smart Grid Communications
Message-ID: <f439722a3fe9d830b374c5f94152a118@lrs-annaba.net>
Content-Type: text/plain; charset=UTF-8; format=flowed

**********15 days to Proposal Deadline**********

"Security Solutions and Applied Cryptography in Smart Grid
Communications"

Edited by: Mohamed Amine Ferrag and Ahmed Ahmim
To be published by: IGI Global, USA

March 5, 2016: Proposal Submission Deadline - Extended

URL1 :
http://www.igi-global.com/publish/call-for-papers/call-details/2020
URL2
: https://sites.google.com/site/smartgridsigiglobal/

Editorial Advisory Board
Nacira Ghoualmi-Zine, Badji Mokhtar- Annaba University, Algeria
Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
Pascal Lorenz, University of Haute Alsace, France
Djamel Djenouri, CERIST Research Center, Algeria
Albena Mihovska, Center for TeleInFrastructur, Aalborg University,
Aalborg, Denmark
Mehdi Nafa, Badji Mokhtar- Annaba University, Algeria
Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/ Islamic University in
Madinah, KSA
Hui Hou, School of Automation, Wuhan University of Technology, China
Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
Mubashir Husain Rehmani, COMSATS Institute of Information Technology,
Wah Cantt, Pakistan
Homero Toral Cruz, University of Quintana Roo, México
Makhlouf Derdour, University of Cheikh Laarbi, Tebessa, Algeria
Lynn M. Batten, Deakin University, Australia
Ram Chakka, RGMCET, RGM Group of Institutions, India
Cristina Alcaraz, University of Malaga, Spain
Sumanth Yenduri, Columbus State University, USA
Chi-Yuan Chen, National Ilan University, Taiwan
P. Venkata Krishna, VIT University, India
Alessio Merlo, University of Genova, Italy
Syed Faraz Hasan, Massey University, New Zealand
Farrokh Aminifar, University of Tehran, Iran
Hossein Akhavan-Hejazi, University of California, USA
Danda B. Rawat, Georgia Southern University, USA

Introduction
Electrical energy storage is a key factor for the future. The
consumption of electrical energy (i.e. the use of air conditioning,
audio and video devices or electric heating) is increasing every year
due; firstly to the increase of the population and secondly by the
appearance of new uses of consumption, such as electric cars. With this
increase consumption, how to ensure the balance between supply and
demand for electricity at all times? To address this problem, the idea
of placing the new generation of smart grids to control this energy has
appeared in recent literature in different flavors in order to provide
electric power supply secure, sustainable and competitive to consumers.
In addition, the revolution in smart grid involves a significant change
in side of the consumer where consumers will also become producer with
the ability of energy storage such as in the vehicle battery, or as a
local generation sources such as photovoltaic panels. However, the smart
grid develops modern solutions for the next-generation network and
digital communication in which many systems and subsystems are
interconnected to provide services from end-to-end network between
various actors and between intelligent devices that are deployed there.
Within each network, a hierarchical structure is composed of different
types of networks, such as the HANs (Home Area Networks), the BANs
(Building Area Networks), the IANs (Industrial Area Networks), the NANs
(Neighborhood Area Networks), the FANs (Field Area Networks), and the
WANs (Wide Area Networks). Currently, large societies propose the use of
cloud computing in smart grid applications connected with the electrical
control center. The main problem in the development of a smart grid is
not located at the physical medium but mainly in delivery of reliability
and security. The possibility of fitting with active or passive attacks
in smart grid network is great to divulge privacy and disrupt energy
(e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack,
Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary
Attack, Routing Table Overflow Attack etc.). Therefore, the security
requirements, including authentication, accountability, integrity,
non-repudiation, access control and confidentiality should be paid more
attention in the future for high performance smart grids. This book will
cover the current scope of various methodologies and mechanisms in the
theory and practice of security, privacy, intrusion detection, and
applied cryptography in smart grid communications in one place.

Objective
This comprehensive and timely publication aims to be an essential
reference source, building on the available literature in the field of
smart grid security in developing countries while providing for further
research opportunities in this dynamic field. It is hoped that this text
will provide the resources necessary for policy makers, technology
developers and managers to adopt and implement smart grid platforms in
developing nations across the globe.

Target Audience
Policy makers, academicians, researchers, advanced-level students,
technology developers, and government officials will find this book
useful in furthering their research exposure to pertinent topics in
smart grid security and assisting in furthering their own research
efforts in this field.

Recommended Topics
This book will include (but will not be limited to) the following
topics. Any other related topics in the area of smart grid security are
also welcome :

- Game theoretical models of smart grid security
- SCADA and legacy system security
- Security and Privacy in Mobile Cloud and Grid Computing
- Secure and resilient cyber-physical and communication architectures
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Machine learning for security
- Computer security visualization techniques
- Intrusion detection based on data mining techniques
- Online money laundering and underground economy
- Hardware vulnerabilities
- Binary analysis and reverse engineering
- Security risk assessment, measurement and management
- Network exfiltration
- Security, privacy, and resource management in Wireless Access Networks
(WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless
Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Hardware security
- Quantum cryptography
- Privacy-preserving systems
- New attacks against computers and networks
- Denial-of-Service Attacks
- Insider attack detection
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis
- Secure software development
- Security and Privacy in Next Generation Mobile Networks
- Protocol security
- Network & active defenses
- Malware and botnet analysis, detection, and mitigation
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Tamper-resistant device technologies
- Smartphone and other embedded systems security
- Fraudulent usage, prevention of traffic analysis
- Cryptography, key management, authorization and access control
- False data injection, detection and mitigation
- Performance evaluation, performance/security tradeoff analysis
- Modern infrastructure for cities(roads, power plants, water treatment
plants, sewage systems, transit systems)
- Energy Efficiency including non-conventional energy management
- Green Environment including E-Waste Management, Hospital Management
etc
- Electro-mobility
- Public key and conventional algorithms and their implementations
- Distributed systems security
- Cyber and Cross-Domain (power to cyber) security event detection,
analysis and response
- DoS/DDoS resiliency
- Cloud security
- Embedded systems security
- Security design and verification tools

Submission Procedure
Researchers and practitioners are invited to submit on or before March
5, 2016 (Extended), a 2-3 page chapter proposal clearly explaining the
mission and concerns of his or her proposed chapter. Authors of accepted
proposals will be notified by March 10, 2016 about the status of their
proposals and sent chapter guidelines. Full chapters are expected to be
submitted by May 15, 2016. All submitted chapters will be reviewed on a
double-blind review basis. Contributors may also be requested to serve
as reviewers for this project. Chapters with multiple authors are
welcome, even encouraged.

Propose a Chapter :
http://www.igi-global.com/publish/call-for-papers/submit/2020

Publisher
This book is scheduled to be published by IGI Global (formerly Idea
Group Inc.), publisher of the "Information Science Reference" (formerly
Idea Group Reference), "Medical Information Science Reference,"
"Business Science Reference," and "Engineering Science Reference"
imprints. For additional information regarding the publisher, please
visit www.igi-global.com. This publication is anticipated to be released
in 2016.


Important Dates
March 5, 2016: Proposal Submission Deadline (Extended)
March 10, 2016: Notification of Acceptance
May 15, 2016: Full Chapter Submission
July 30, 2016: Review Results Returned
September 01, 2016: Final Acceptance Notification
September 15, 2016: Final Chapter Submission

Editors

Mohamed Amine Ferrag (Ph.D.)
Department of Computer Science
Faculty of Mathematics, Computer Science, and Material Science
Guelma University
BP 401 Guelma 24000 – Algeria
Tel.: +2137 96 96 14 53
E-mail: mohamed.amine.ferrag@gmail.com

Ahmed Ahmim (Ph.D.)
Department of Mathematics and Computer Science,
Faculty of Exact Sciences and Sciences of Nature and Life
University of Larbi Tebessi,
Route of Constantine, Tebessa 12000 – Algeria
Tel.: + 213 5 55 86 70 65
E-mail: a.ahmim@gmail.com

__________________________________________________
Dr. Mohamed Amine Ferrag
Assistant Professor
Department of Computer Science
Guelma University
BP 401 Guelma 24000, Algeria
Tel. : +213 796 961 453
E-mails: maferrag@outlook.fr / mohamed.amine.ferrag@gmail.com
maferrag@lrs-annaba.net
HomePage : https://sites.google.com/site/mohamedamineferrag/
____________________________________________________


------------------------------

Message: 3
Date: Thu, 18 Feb 2016 09:57:24 +0530
From: Sidda Chandrappa
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] INTECH 2016
Message-ID: <038c643bce004a88140414afe229e1a0@dirf.org>
Content-Type: text/plain; charset=UTF-8; format=flowed

CALL FOR PAPERS

Sixth International Conference on Innovating Computing Technology
(INTECH 2016)
August 24-26, Dublin, Ireland
www.dirf.org/intech
(Technically co-sponsored by UK & Ireland IEEE)
(Xplore publishing)

The First international conference on Innovative Computing Technology
(INTECH 2011) was held at Sao Carlos in Brazil followed by the Second
International Conference on Innovative Computing Technology (INTECH
2012) at Casablanca in Morocco. The INTECH 2013, INTECH 2014 and INTECH
2015 were organized at London and Luton, UK respectively. The INTECH
2016 is organized at Dublin, Ireland. The INTECH 2016 offers the opening
for institutes, research centers, engineers, scientists and industrial
companies to share their latest investigations, researches, developments
and ideas in area of Innovative Computing Technology, which covers huge
topics.

The INTECH intends to address various innovative computing techniques
involving various applications. This forum will address a large number
of themes and issues. The conference will feature original research and
industrial papers on the theory, design and implementation of computing
technologies, as well as demonstrations, tutorials, workshops and
industrial presentations. This conference (INTECH 2016) will include
presentations of contributed papers by invited keynote speakers.

Conference papers will include innovative computing paradigms in the
following topics:

Network and Information Security Innovative Computing Systems and
Applications in S & T domains such as –
Algorithms Applied Information Systems
Artificial Intelligence and Decision Support Systems
Broadcasting Technology
Cloud Computing
Computational Intelligence
Data and Network mining
Data Stream Processing in Mobile/Sensor Networks
Database Systems
Digital Image/Video Processing
E-Learning, e-Commerce, e-Business and e-Government
Electronics Environmental modeling and precision agriculture
Fault Classification and Pattern Recognition
Green Computing
Grid computing
Human-Computer Interaction
Intelligent Condition
Monitoring Mobile network and systems
Multimedia and Interactive Multimedia Payment Systems
Peer-to-peer networks
Precision Farming
Web Farming
Signal Processing Soft Computing Fuzzy and Neural Network Systems,
Optimization algorithms Software Engineering Intelligent Farming
Web farming,
Web irrigation Ubiquitous Computing User Interfaces,
Visualization and Modeling
Virtual Reality Visualization
Web services
WWW Applications and Technologies
XML and other Extensible Languages


The INTECH proceedings will also be indexed by dblp. All the papers will
be reviewed and the accepted papers in the conference will be submitted
to IEEE Xplore for indexing and will be indexed in many global
databases.In addition, all the accepted papers (for Journals) will be
published in the following issues journals after substantial revision
and modification.

Journal of Digital Information Management (JDIM) (Scopus and EI Indexed)
International Journal of Enterprise Information Systems (Scopus and EI
Indexed)
International Journal of Grid and High Performance Computing (IJGHPC)
(Scopus and EI Indexed)
International Journal of Computational Science and Engineering (Scopus
and EI Indexed)
International Journal of Big Data Intelligence
International Journal of Applied Decision Sciences (Scopus/EI)
International Journal of Management and Decision Making (Scopus/EI)
International Journal of Strategic Decision Sciences
International Journal of Enterprise Information Systems (Scopus/EI)
Recent Advances in Electrical & Electronic Engineering (Scopus)

IMPORTANT DATES

Submission of papers: June 01, 2016
Notification of Acceptance/Rejection: July 10, 2016
Camera Ready: August 10, 2016
Registration August 10, 2016
Conference: August 24-26, 2016

Submissions at: http://www.dirf.org/intech/paper-submission/

Contact: intech@dirf.org OR intech@socio.org.uk


------------------------------

Message: 4
Date: Thu, 18 Feb 2016 10:32:01 +0100
From: Antonino Masaracchia<aoc2016_publicity@iit.cnr.it>
To: dmanet@zpr.uni-koeln.de
Subject: [DMANET] AOC 2016: IEEE WoWMoM Workshop on Autonomic and
Opportunistic Communications
Message-ID: <56c58f91.Ha8uObzdzUo8dg4A%aoc2016_publicity@iit.cnr.it>
Content-Type: text/plain; charset=us-ascii

--------------------------------------------------------------------------------

CALL FOR PAPERS
Tenth IEEE WoWMoM Workshop on
Autonomic and Opportunistic Communications (AOC 2016)
June 21, 2016 - Coimbra, Portugal
http://cnd.iit.cnr.it/aoc2016

in conjunction with IEEE WoWMoM, 2016
http://wowmom2016.uc.pt/


**** Submission Deadline --- March 10, 2016 ****

--------------------------------------------------------------------------------

SCOPE AND OVERVIEW

The recent proliferation of sensor-rich portable devices is enabling novel communication paradigms for users and contributing to the implementation of the ubiquitous computing and networking vision. Opportunistic networking represents a key communication paradigm for this vision. Either as a standalone communication mode or as a complement to infrastructure-based communication, opportunistic networking leverages the mobility of end users to enhance their ability to communicate in the absence of reliable end-to-end connectivity. Opportunistic networking opens up many possibilities but also poses countless new challenges. The goal of the AOC 2016 workshop is to serve as a forum for researchers, professionals, application developers, and other experts from both academia and industry to exchange new ideas, discuss new solutions, and share their experiences. As with previous editions, this year's workshop is particularly interested in novel research directions, such as service composition techniques, co-existence with infrastructure networks such solutions based on fog or edge computing, and insights from complex network analysis applied to autonomic and opportunistic communications.

The workshop will solicit original papers addressing theoretical and practical aspects of autonomic and opportunistic communications as well as papers describing prototype implementations and deployments.
Topics of interest for AOC 2016 include, but are not limited to:
- Techniques for data dissemination and replication
- Context and social awareness mechanisms and algorithms
- Autonomous and self-adaptive systems for smart cities
- Autonomous solutions for IoT and cyber-physical systems
- Solutions based on fog or edge computing
- Big data for autonomic and opportunistic systems
- Mobile social networking algorithms and applications
- Co-existence of opportunistic networks with infrastructure mobile wireless networks
- Mobility models and statistical analysis of mobility traces
- Service composition in autonomic and opportunistic networks
- Cognition-driven information processing and decision making
- Performance modelling, scaling laws, and fundamental limits for autonomic and opportunistic communications
- Participatory and urban sensing in autonomic and opportunistic networks
- Game-theoretic insights to the operation of autonomic and opportunistic networks
- Trust, security, and reputation
- Autonomic and opportunistic communication testbeds and prototypes, measurement data from real experiments
- Socio-economic models for autonomic and opportunistic communications
- SNA and graph modeling for autonomic and opportunistic networks
- Autonomic and opportunistic solutions for mobile cloud applications
- Applications and middleware support
- Routing, transport, and reliability issues

PAPER SUBMISSION AND PUBLICATION
--------------------------------

Submission will be managed electronically through EDAS (https://edas.info/newPaper.php?c=21826).

Papers should neither have been published elsewhere nor being currently under review by another conference or journal. Manuscripts are limited to 6 pages, single spacing, double column, and must strictly adhere to the template format.
Accepted papers will appear in the symposium proceedings published by IEEE. There will be no separate workshop registration, as one single registration will cover both conference and workshops participation. At least one author of each accepted paper must register to the workshop and present his/her work.


IMPORTANT DATES
---------------
Full papers due: March 10, 2016
Notification: April 15, 2016
Camera-ready: April 29, 2016
Workshop: June 21, 2016

ORGANISING COMMITTEE
--------------------

Workshop Co-Chairs
Michela Papandrea, SUPSI, Switzerland
Matteo Zignani, University of Milan, Italy
Valerio Arnaboldi, IIT, CNR, Italy

Publicity Chair
Antonino Masaracchia, IIT, CNR, Italy

PROGRAM COMMITTEE

Alan Ferrari, SUSPSI, Switzerland
Anna Forster, University of Bremen, Germany
Chiara Boldrini, IIT-CNR, Italy
Christian Rohner, Uppsala University, Sweden
Eiko Yoneki, University of Cambridge, UK
Elena Pagani, Universita' di Milano, Italy
Franck Legendre, ETH, Switzerland
Hongyi Wu, University of Louisiana at Lafayette, USA
Jorg Ott, Technische Universitat Munchen
Kamini Garg, SUPSI, Switzerland
Kyunghan Lee, UNIST, Korea
Lorenzo Valerio, IIT-CNR, Italy
Matteo Mordacchini, IIT-CNR, Italy
Nicholas Lane, Bell Labs, UK
Pavlos Sermpezis, FORTH, Greece
Roger Whitaker, University of Cardiff, UK
Sabrina Gaito, Universita' degli Studi di Milano, Italy
Sebastian Zander, Swinbourne University of Technology, Australia
Serge Fdida, UPMC Sorbonne Universites, France
Thrasyvoulos Spyropoulos, EURECOM, France
Tristan Henderson, University of St Andrews, United Kingdom
Vania Conan, Thales Communication and Security, France
Waldir Moreira, COPELABS/University Lusofona, Portugal

For further information, please contact the workshop chairs at aoc2016 at iit.cnr.it

------------------------------

Subject: Digest Footer

_______________________________________________
dmanet mailing list
dmanet@zpr.uni-koeln.de
http://www.zaik.uni-koeln.de/mailman/listinfo/dmanet


------------------------------

End of dmanet Digest, Vol 96, Issue 23
**************************************

No comments:

Post a Comment