posted by user: wmazurczyk || 4005 views || tracked by 7 users: [display]

IWNS 2010 : Second International Workshop on Network Steganography

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/workshop
 
When Nov 4, 2010 - Nov 6, 2010
Where Nanjing, China
Submission Deadline May 30, 2010
Notification Due Jun 15, 2010
Final Version Due Jul 10, 2010
Categories    steganography   security   covert channels   information hiding
 

Call For Papers

**************************************************************************

Second International Workshop on Network Steganography - IWNS 2010
November 4-6, 2010, Nanjing, China
co-located with
The 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010)

http://stegano.net/workshop

**************************************************************************


Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data
transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of
network protocols and mechanisms, and are expected to be used in secret
communication or information sharing. Now, it becomes a hot topic due to
the wide spread of information networks, e.g., multimedia service
networks and social networks.

This year's workshop's main theme is network anomaly detection.

The workshop is dedicated to capture such areas of research as steganography,
steganalysis, and digital forensics in the meaning of network covert channels,
investigate the potential applications, and discuss the future research topics.
Research themes of the workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues related to network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography
and steganalysis
- New methods for detecting and eliminating network steganography


PAPER SUBMISSION AND PUBLICATION

Papers will be accepted based on peer review and should contain
original, high quality work. All papers must be written in English. A
paper should not exceed 5 pages (two columns IEEE format), including
figures and references with 10-12 point font.

Submission page: TBA

The papers will be published by IEEE Computer Society Press, available
in the conference, and indexed by EI Compendex and ISTP. All published
papers will be included in the IEEE Xplore database.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of some journal.

DATES

Manuscript Due: Extended to May 30, 2010 (extended)
Acceptance Notification: June 15, 2010
Registration Due: July 10, 2010
Final Manuscript Due: July 10, 2010

WORKSHOP CHAIRS

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

TMA 2018   Network Traffic Measurement and Analysis Conference
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
IWDCF 2017   The 3rd International Workshop on Digital Crime and Forensics
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
EI CAECT 2018   2018 International Conference on Aerospace Engineering and Control Technologies(CAECT 2018)
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
CUING 2017   International Workshop on Criminal Use of Information Hiding
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
IJCSITY 2017   International Journal of Computational Science and Information Technology