logo

Organizing Committee

Carol Fung
Virginia Commonwealth University, USA

Mohamed Faten Zhani
École de Technologie Supérieure, Canada

Weverton Cordeiro
Federal Institute of Pará @ Itaituba, Brazil

Technical Program Committee

Marinho Barcellos, Federal University of Rio Grande do Sul, Brazil

Weverton Cordeiro, Federal Institute of Pará @ Itaituba, Brazil

Yehia Elkhatib, Lancaster University, United Kingdom

Carol Fung, Virginia Commonwealth University, USA

Luciano Gaspary, Federal University of Rio Grande do Sul, Brazil

Amer Hassam, Microsoft, USA

Mohamed Ali Kaafar, NICTA, Australia

Farouk Kamoun, École Nationale des Sciences de l'Informatique, Tunisia

Ming Li, Utah State University

Barbara Martini, CNIT, Italy

Giovane Moura, Delft University of Technology, The Netherlands

Flávio Santos, Chaordic Systems, Brazil

Zhongzhi Luan, Beihang University, China

Jiahai Yang, Tsinghua University, China

Qi Zhang, University of Toronto, Canada

Mohamed Faten Zhani, École de Technologie Supérieure, Canada

Quanyan Zhu, New York University, USA

 

IEEE/IFIP DISSECT 2015

1ST IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Co-located with IEEE/IFIP IM 2015
Ottawa, Canada


We thank all attendees for making DISSECT 2015 a great success! We look forward to seeing you all next year!

Please check below for workshop photos, slides, and awards!

 

Latest Updates

  • The website for the 2016 edition of DISSECT is now online!
  • The Digital Object Identifier (DOI) of the full papers and posters are available!

Older News

  • The best paper and poster were awarded to A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network and TOPASE: Detection of Brute Force Attacks used Disciplined IPs from IDS Log, respectively. Congratulations!
  • The presentation slides from Chris Ullock's keynote are available on the keynote page. Please click here to access the content.
  • The DISSECT 2015 photo album is now online @ Picasa Web!
  • DISSECT workshop will take place at Room 101. To view the floors layout at the Shaw Centre, please click here.
  • Please check the final program for DISSECT 2015!
  • We are pleased to announce that Nakina System's security expert and senior product manager Chris Ullock will deliver a keynote during DISSECT 2015! On his keynote, Mr. Ullock will discuss emerging security requirements created by Network Function Virtualization. For further information, please click here!
  • The tentative program for DISSECT 2015 is now online!
  • Please click here for registration and VISA info.
  • DISSECT 2015 will take place on May 15th, 2015!

 

Call for papers, PDF version

The emergence of next generation networking technologies and paradigms, such as cloud computing and software defined networking, has completely transformed the way networks are designed, deployed, and managed, and has brought a multitude of challenges to the spotlight of worldwide research. In this context, security has been one of the areas of major concern and thus research interest, especially with the growing demands of the general public for secure, trustworthy, and privacy-preserving data communication and management.

The main goal of the International Workshop on Security for Emerging Distributed Network Technologies (DISSECT) is to put focus on security issues and challenges arising with the emergence of novel networking technologies and paradigms. The workshop will shed light on new challenges and present state-of-the-art research on the various security aspects of next-generation networking technologies and service management frameworks.

DISSECT will offer a venue for bringing together students, researchers, and professionals from academia and industry sharing common interest on security challenges related to the design and management of the distributed networks and infrastructures. DISSECT is intended to (1) discussing these challenges as well as future trends on security management, (2) present and discuss work-in-progress security-related research on cutting-edge technologies, and (3) strengthening collaboration and research ties among peers.

Topics of Interest

In this workshop, the research community from industry and academia will be invited to contribute with manuscripts describing novel, work-in-progress research on the design of solutions to relevant security issues on a wide variety of next generation networking technologies. The topics of interest of the workshop include, but are not limited to

  • Secure networking architecture design
  • Intrusion detection and mitigation for emerging networks
  • Trust and privacy in social networks
  • Security and trust management in cloud environments
  • Security challenges on Internet of things
  • Secure design of software defined networking solutions
  • Networked, distributed systems security
  • Networks forensics and auditing
  • Security and privacy of mobile systems
  • Privacy-enhancing technologies
  • Security measurement and analysis
  • Security "in-the-air" and "in-the-wire"
  • Security tooling
 

Date and Location

Ottawa, Canada, 15th May 2015

Held in conjunction with IEEE/IFIP International Symposium on Integrated Network Management (IM) Ottawa, Canada.

Venue

To be held at the Ottawa Convention Center. Further information on workshop venue, accommodation, travel, and more is available on the IM 2015 website http://im2015.ieee-im.org

Important Dates

15th Dec 2014 12th Jan 2015 Paper Submission Deadline (EXTENDED)

30th Jan 2015 Acceptance Notification

15th Feb 2015 Camera-Ready Papers

15th May 2015 Workshop Day

Paper Submission

Paper submissions must present original, unpublished research or experiences. Papers under review elsewhere must not be submitted to the workshop.

All contributions must be submitted in PDF format via JEMS https://submissoes.sbc.org.br/dissect2015.

The submission and acceptance of contributions will be subject to a rigorous peer review process to ensure originality, timeliness, relevance, and readability.

Paper Format

All papers must be limited to 6 pages in an IEEE 2-column style and will be subject to a peer-review process.

The accepted papers will be submitted for publication in the IEEE Xplore Digital Library. Papers will be withdrawn from IEEE Xplore in case the authors do not present their paper at the workshop.