posted by user: wmazurczyk || 4100 views || tracked by 7 users: [display]

IWNS 2010 : Second International Workshop on Network Steganography

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/workshop
 
When Nov 4, 2010 - Nov 6, 2010
Where Nanjing, China
Submission Deadline May 30, 2010
Notification Due Jun 15, 2010
Final Version Due Jul 10, 2010
Categories    steganography   security   covert channels   information hiding
 

Call For Papers

**************************************************************************

Second International Workshop on Network Steganography - IWNS 2010
November 4-6, 2010, Nanjing, China
co-located with
The 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010)

http://stegano.net/workshop

**************************************************************************


Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data
transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of
network protocols and mechanisms, and are expected to be used in secret
communication or information sharing. Now, it becomes a hot topic due to
the wide spread of information networks, e.g., multimedia service
networks and social networks.

This year's workshop's main theme is network anomaly detection.

The workshop is dedicated to capture such areas of research as steganography,
steganalysis, and digital forensics in the meaning of network covert channels,
investigate the potential applications, and discuss the future research topics.
Research themes of the workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues related to network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography
and steganalysis
- New methods for detecting and eliminating network steganography


PAPER SUBMISSION AND PUBLICATION

Papers will be accepted based on peer review and should contain
original, high quality work. All papers must be written in English. A
paper should not exceed 5 pages (two columns IEEE format), including
figures and references with 10-12 point font.

Submission page: TBA

The papers will be published by IEEE Computer Society Press, available
in the conference, and indexed by EI Compendex and ISTP. All published
papers will be included in the IEEE Xplore database.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of some journal.

DATES

Manuscript Due: Extended to May 30, 2010 (extended)
Acceptance Notification: June 15, 2010
Registration Due: July 10, 2010
Final Manuscript Due: July 10, 2010

WORKSHOP CHAIRS

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

CNSM 2018   International Conference on Network and Service Management
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICCNS--Ei and Scopus 2018   2018 the 8th International Conference on Communication and Network Security (ICCNS 2018)--Ei Compendex and Scopus
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
CUING 2018   Criminal Use of Information Hiding
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
CSS 2018   10th International Symposium on Cyberspace Safety and Security
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
ICNP 2018   IEEE International Conference on Network Protocols
IJRAP 2018   International Journal of Recent advances in Physics