Network/Computer Security Workshop
August 4-5th, Bethlehem, PA 18015
http://winslab.cse.lehigh.edu/workshop
In the past few years, we have seen significant increase in cyber attacks on the Internet, resulting in degraded performance in the use of Internet and computer systems. The attacks, including DDoS, email virus, and worms, are getting more sophisticated, spreading faster, and causing more damages. The attacks originally exploited the weakness of the individual protocols and operating systems, but now also have started to attack the basic infrastructure of the Internet. Many techniques, algorithms, protocols and tools have been developed in the different aspects of cybersecurity, namely, DDOS mitigation techniques, authentication, access control, automatic worm signature generation etc, as they apply to both networks and systems. In addition, there is an increasing demand for measures to guarantee the privacy, integrity, and availability of resources in distributed systems, such as Grid and P2P systems.
The goal of the workshop is to promote discussions or research and relevant activities in security related subjects and to encourage women and underrepresented minority students to participate in this exciting research area. It is very likely that limited stipends will be available for some selected students and faculty members to attend this workshop.
Students/Faculty members who are interested in applying for stipends should refer to the scholarship application section for more details on the application procedure.
Topics of interest:
The workshop seeks papers that address theoretical, experimental, and work in-progress in the area of cybersecurity at the system and network levels. Topics covered by the workshop will include, but are not limited to, the following:
o Distributed denial of service attacks
o Distributed intrusion detection and protection systems
o Firewall and distributed access control
o Key management
o Network security issues and protocols
o Mobile codes security and Internet Worms
o Ad hoc and sensor network security
o Security in peer-to-peer and overlay networks
o Security architectures in distributed and parallel systems
Important Dates
Papers due: June 24th, 2005
Author notification: July 5th, 2005
Scholarship application deadline: July 6th, 2005
Scholarship award notification: July 10th, 2005
Camera-ready final papers due: July 15th, 2005
Workshop: August 5th, 2005