Conferences In Information Security

Conference Name International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Venue Bonn, Germany
URL http://www.dimva.org/
Submission Deadline 12-Feb-10
Conference Date 8-9 July 2010
Sponsership/Publisher LNCS Series Springer
Aim/Scope/Research Area The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security – Intrusion Detection and Response of the German Informatics Society (GI). The conference proceedings will appear in Springer’s Lecture Notes in Computer Science (LNCS) series.

DIMVA solicits submission of high-quality, original scientific work. This year we invite two types of paper submissions:

• Full papers, presenting novel and mature research results. Full papers are limited to 20 pages, prepared according to the instructions provided below. They will be reviewed by the program committee, and papers accepted for presentation at the conference will be included in the proceedings.

• Short papers (extended abstracts), presenting original, still ongoing work that has not yet reached the maturity required for a full paper. Short papers are limited to 10 pages, prepared according to the instructions provided below. They will also be reviewed by the program committee, and papers accepted for presentation at the conference will be included in the proceedings (containing Extended Abstract in the title).

DIMVA’s scope includes, but is not restricted to the following areas:

Intrusion Detection
• Novel approaches & new environments
• Insider detection
• Prevention and response
• Data leakage
• Result correlation & cooperation
• Evasion attacks
• Potentials & limitations
• Operational experiences
• Privacy, legal & social aspects Malware
• Automated analysis, reversing & execution tracing
• Containment & sandboxed operation
• Acquisition of specimen
• Infiltration
• Behavioral models
• Prevention & containment
• Trends & upcoming risks
• Forensics & recovery
• Economic aspects Vulnerability Assessment
• Vulnerability detection & analysis
• Vulnerability prevention
• Web application security
• Fuzzing techniques
• Classification & evaluation
• Situational

Back To Conferences List

Database Sections