|
|||||||||||||||||||||||||||||||||||||||||
First, fill out the submission form with information about your paper. Please, fill it out only once for each paper, and do not resubmit it. Contact the address below if you run into any difficulties. As the designated correspondence author, you will then receive a first e-mail message containing the paper ID. The information in the email will allow you to submit your paper. If you have some problems send your paper via this e-mail (please report your paper ID in the text of your mail AND the name of the conference). The conference staff will contact you only if the paper does not print properly or has other problems. You can change information about your paper, submit brief corrections, view an email trail, and even edit your personal information by following the link in the initial confirmation email.
Touristic information is available from the hosting conference, ICDS 2012.
Hotels and travel information is available from the hosting conference page, ICDS 2012.
Recognition of the intrusion problem is causing organisations to come under increasing pressure to protect confidential data on their computer networks from external risks. Both private and public sector firms have a duty to their stake holders to ensure that the data held on their systems remains uncompromised and secure. However, recorded incidents of system breaches are on the increase with malicious hackers now more focused on commercial gain than notoriety. Intrusion Prevention and Detection Systems (IPDS) are now becoming established as the primary countermeasure to such attacks. By identifying attacks at the initial stages and either alerting, or taking an active response to prevent them, they are becoming part of many organizations standard defense policies. However with the number of attacks and their level of innovation increasing it is becoming increasing difficult find effective IPDS protection solutions. The problem is being further exacerbated through the development and subsequent use of “point and shoot” tools which allow highly sophisticated attacks to be performed with little to no understanding of the attack concepts they utilize. With this in mind, it is essential that the high level of creativity being demonstrated by malicious hackers is matched by that of the IPDS community. In response to this challenge, Intrusion Prevention and Detection Systems have now grown in prominence to such an extent that they are now considered a vital component for any enterprise organisation serious about network defence. However the numerous recorded attacks against high profile organizations is continuing evidence that many of these controls are not, at present, a panacea for dealing with the threats. Having themselves learnt the mechanisms employed by IPDS malicious parties are becoming particularly adept at evading them through inventive obfuscation techniques. These challenges need to be addressed using increasingly more innovative, creative and measurable IPDS mechanisms and methods. We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals. Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status. Tutorials on specific related topics and panels on challenging areas are encouraged. The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. All topics and submission formats are open to both research and industry contributions.
INSTRUCTION FOR THE AUTHORS Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals. Publisher: XPS (Xpert Publishing Services) Important deadlines:
Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system. Regular Papers (up to 6-10 page article) Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Helpful information for paper formatting can be found on the here. Your paper should also comply with the additional editorial rules. Once you receive the notification of paper acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance. Work in Progress (short paper up to 4 pages long) Work-in-progress contributions are welcome. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Authors should submit a four-page (maximum) text manuscript in IEEE double-column format including the authors' names, affiliations, email contacts. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings. For more details, see the Work in Progress explanation page Posters (poster or collection of 6 to 8 slides, including industrial presentations) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. Acceptance will be decided based on a 1-2 page abstract and/or 6-8 .pdf slide deck submitted through the conference submission website. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. One big Poster and/or the associated slides should be used for discussions, once on the conference site. For more details, see the Posters explanation page. Ideas (2 page proposal of novel idea) This category is dedicated to new ideas in their early stage. Contributions might refer to PhD dissertation, testing new approaches, provocative and innovative ideas, out-of-the-box, and out-of-the-book thinking, etc. Acceptance will be decided based on a maximum 2 page submission through the conference submission website. The contributions for Ideas will be presented in special sessions, where more debate is intended. The Idea contribution must be comprehensive, focused, very well supported (details might miss, obviously). A 6-8 slide deck should be used for discussions, once on the conference site. For more details, see the Ideas explanation page. Technical marketing/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will not be published in the conference’s CD Proceedings. Presentations' slide decks will be posted on the IARIA's site. Please send your presentations to [email protected]. Tutorials Tutorials provide overviews of current high interest topics. Proposals should be for three hour tutorials. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorials' slide decks will be posted on the IARIA's site. Please send your proposals to [email protected] Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel's slide deck will be posted on the IARIA's site. For more information, [email protected]
(to be announced)
Tutorials are available from the hosting conference page, ICDS 2012.
Preliminary program is available from the hosting conference page, ICDS 2012.
Helpful information for paper formatting can be found on the here. LaTex templates can be found here. More information coming after the paper accept/reject notifications are sent out.
One registration form covers the registration of the paper and the participation of one presenter. If an author has two (or more) accepted papers, each paper must be registered with a separate form. Every participant must register separately. (if two co-authors attend, they each must register) There are a limited number of prebooked hotel rooms. We suggest you reserve yours at the same time with the paper registration. The flight information can be sent at a later date. Registration form download: Note: If you attend but do not have a paper to present, use paper number "0" on your registration form. The registration form in RTF format can be found here. [note: form will be available after notification is sent]
Statistics are available from the hosting conference page, ICDS 2012.
Photos are available from the hosting conference page, ICDS 2012.
Awards are available from the hosting conference page, ICDS 2012. |
|||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2012, IARIA