posted by user: wmazurczyk || 3511 views || tracked by 6 users: [display]

IWNS 2009 : First International Workshop on Network Steganography

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/workshop/
 
When Nov 18, 2009 - Nov 20, 2009
Where Wuhan, Hubei, China
Submission Deadline Jun 10, 2009
Notification Due Jul 15, 2009
Final Version Due Jul 30, 2009
Categories    security   network steganography   information hiding   network security
 

Call For Papers

**************************************************************************
First International Workshop on Network Steganography - IWNS 2009
November 18-20, 2009, Wuhan, Hubei, China
co-located with
International Conference on Multimedia Information Networking and
Security (MINES 2009)

http://stegano.net/workshop
**************************************************************************


Network steganography is part of information hiding focused on modern networks and is a method of hiding secret data in users' normal data transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of network protocols and mechanisms, and are expected to used in secret communication or information sharing. Now, it becomes a hot topic due to the wide spread of information networks, e.g., multimedia service networks and social networks. The workshop is dedicated to capture such areas of research as steganography, steganalysis, and digital forensics
in the meaning of network covert channels, investigate the potential applications, and discuss the future research topics. Research themes of workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues in network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography and steganalysis
- New methods for eliminating network steganography


PAPER SUBMISSION AND PUBLICATION

Papers will be accepted based on peer review and should contain original, high quality work. All papers must be written in English. A paper should not exceed 5 pages (two columns IEEE format), including figures and references with 10-12 point font.

Submission page: http://www.easychair.org/conferences/?conf=mines2009

The papers will be published by IEEE Computer Society Press, available in the conference (MINES 2009), and indexed by EI Compendex and ISTP.

The extended versions of high-quality papers selected from the workshop will be published in a special issue of Telecommunication Systems:
Modelling, Analysis, Design and Management by Springer-Verlag GmbH
(indexed by ISI Master Journal List).

DATES

Manuscript Due: June 1, 2009
Acceptance Notification: July 15, 2009
Final Manuscript Due: July 30, 2009
Registration Due: August 10, 2009

WORKSHOP CHAIRS

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE-CISNS 2021   2021 2nd International Conference on Information System and Network Security (CISNS 2021)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
IJNSA 2021   International Journal of Network Security & Its Applications- ERA Listed
COIT 2022   2nd International Conference on Computing and Information Technology
MobiHoc 2022   Mobile Ad Hoc Networking and Computing
IEEE Network 2021   IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges