ICIMP 2023 - The Eighteenth International Conference on Internet Monitoring and Protection
	June 26, 2023 - June 30, 2023
 ICIMP 2023
Due to the holiday season and requests from contributors the submission site remains open.
Onsite and Online Options: In order to accommodate a large number of situations, we are offering the option for either physical presence or virtual participation (pdf slides or pre-recorded videos).
	ISSN: 2308-3980
	ISBN: 978-1-68558-070-4 
		ICIMP 2023 is colocated with the following events as part of DataSys 2023 Congress:
		  - AICT 2023, The Nineteenth Advanced International Conference on Telecommunications
 	  - ICIW 2023, The Eighteenth International Conference on Internet and Web Applications and Services
 	  - ICIMP 2023, The Eighteenth International Conference on Internet Monitoring and Protection
 	  - SMART 2023, The Twelfth International Conference on Smart Cities, Systems, Devices and Technologies
 	  - IMMM 2023, The Thirteenth International Conference on Advances in Information Mining and Management
 	  - INFOCOMP 2023, The Thirteenth International Conference on Advanced Communications and Computation
 	  - MOBILITY 2023, The Thirteenth International Conference on Mobile Services, Resources, and Users
 	  - SPWID 2023, The Ninth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
 	  - ACCSE 2023, The Eighth International Conference on Advances in Computation, Communications and Services
 	
ICIMP 2023 conference tracks:
CYBERSECURITY: Trends in Cybersecurity
	 Blockchain and machine learning for cybersecurity; Behavioral          biometrics authentication;          Privacy by design; Anonymity of blockchain and cryptocurrencies;          Threat categorization          and threat detection; Threats on critical national          infrastructures; Gift card hacking          techniques; Medical IoT Device-to-Device communication;          Blockchain in          supporting critical infrastructures; Vulnerability on social          media spaces; Internet          of Medical Things (IOMT); Cybersecurity for digital vehicles;          Potential radicalization          on social media; Blockchain and healthcare systems; Risk-based          human behavior profiling;          Forensic recovery of cloud evidence; Hacking pacemakers;          Prediction of cyber attacks;          Ransomware cyberweapon; Liability attribution in smart          workplaces;          Cybersecurity,  laws and          regulations;  Information          from browsers by online advertising          platforms; Predicting social engineering victims; Cybercrime          awareness
	TRENDS: Trends on monitoring with new technologies
	 Traffic in SND-based data centers; Risk control for shared-servers      in data centers; Fraud prevention in Cloud networking; Discovering      and monitoring Botnets in SDNs; 5G traffic measurement and      monitoring; Monitoring challenges in Smart Cities; Monitoring Smart      buildings; Smart metering and monitoring; Smart sensing for ral-time      monitoring and control; Monitoring IoT (internet of Things)-based      networks; Secure SDNs;  Secure IoTs;  Monitoring 5G LTE-Advanced      networks; LTE-R measurements; Traffic with Big Data; QoE-aware      traffic; QoS and QoE in LTE networks; Fraud detection Smart Cities      networks; Cyber-attacks in device-to-device Internet; Safety on IoD      (Internet of Drones); Monitoring digital health services; Monitoring      mission-critical services; Preventing Cyber-systems attacks;      Identity control and management; Predictive traffic assessment;      Optimal balancing control
	TRASI: Internet traffic surveillance      and interception
	Methods and context to classify legal and illegal traffic;
	  Methods and   procedure to classify wanted and undesired traffic;
	  Overloads, attacks, and   failures;
	  Detection of attacks via protocols and applications;
	  Undesired   traffic evaluation;
	  Traffic identification caused by malicious code (spam,   virii, and worms, etc.);
	  Traffic profile during disaster recovery;
	  Traffic   during active emergency services;
	  Early warning on growing undesired   traffic;
	  Access control and audit detection points;
	  Denial of   service;
	  Spoofing;
	  Lawful interception;
	  Multi-modal undesired traffic   detection;
	  Measurements and data mining correlation;
	  Countermeasures on   undesired traffic
	IPERF: Internet      performance
	Performance-oriented design;
	  Active and passive performance   monitoring; Performance metrics and measurements;
	  Measurement-based   performance evaluation in Internet;
	  System measurement and   monitoring;
	  Performance model verification and validation;
	  Stochastic   modeling (queues,  Petri nets, etc.);
	  Statistical performance;
	  Performance   of Internet routing;
	  Performance optimization;
	  Internet performance   prediction;
	  Internet performance evaluation studies;
	  Internet performance   testbeds;
	  Performance evaluation of Web search engines;
	  Performance   evaluation of P2P systems
	RTSEC: Security      for Internet-based real-time systems
	Security and availability of Web Services;
	  Security/Performance   trade-off;
	  Distributed systems security;
	  Language-based   security;
	  Formalisms for security and protocol verification;
	  Performance   on firewall protected real-time systems;
	  Security management in real-time   systems;
	  Metrics and techniques for security risk assessment;
	  Internet   monitoring and response security service;
	  Protecting emergency communications   from misuse and exploitation;
	  Maintaining security in the face of   disaster;
	  Intrusion prevention and detection systems;
	  Secure networks from   web-based threats
	DISAS: Disaster prevention and      recovery
	Survivable networks on chips;
	  Intrusion detection and defense;
	  Alerting   systems based on outstanding network events;
	  Recovery methods in various   networks;
	  Disaster diagnosis and continuity plans;
	  Fighting mechanisms for   disaster of networks and applications;
	  Global positioning systems;
	  Vehicle   localization and navigation systems;
	  Disaster relief agencies to perform   recovery operations;
	  Survivability-driven defense and do-it-yourself disaster   recovery;
	  Security during disaster recovery;
	  Budgeting disaster recovery;
	  Networks emergency services;
	  Reliable emergency communications and   applications;
	  Response to the networks emergency services;
	  Disaster   prevention and recovery;
	  Fighting mechanisms for disaster of networks and   applications; Networks resiliency methods;
	  Recovery in various networks;
	  Theory on robust networks;
	  Customer protection and serviceability   perception;
	  Cost models and business impact;
	  Cultural and legal aspects;
	  Future advanced network development and evolution;
	  Standards and   guidelines;
	  Lawful interception and defense strategies;
	  Security issues   with emergency services and disaster recovery
	EMERG: Networks and applications      emergency services
	Survivability architecture for e-commerce;
	  Emergency and non-emergency   services;
	  Emergency coverage and intermittent services;
	  PSAPs and emergency   services;
	  Future 911 PSAP message interfaces;
	  Reliable emergency   communications;
	  Next generation of emergency communications;
	  Response to the   networks emergency services;
	  Voice emergency notification services
	MONIT: End-to-end sampling,      measurement, and monitoring
	Internet monitoring techniques and procedures;
	  Monitoring tools, functions,   and metrics;
	  Combining, filtering, and reporting monitoring metrics;
	  Theory   and practice on sampling/inversion problem (accuracy, complexity,   etc.);
	  Distributed and adaptive sampling techniques;
	  Sampling &   inverting traffic with passive and active systems;
	  Internet end-to-end   measurements from a sampling perspective;
	  Impact of sampling on anomaly   detection;
	  Mechanisms for sampling the Internet traffic or collected   traces;
	  On-line and off-line metrics and measurements;
	  Incident estimation   and monitoring;
	  Internet access monitoring;
	  Spy   software;
	  Internet monitoring, filtering and blocking software;
	  Monitoring   Internet traffic to optimize network bandwidth;
	  Remote monitoring
	REPORT: Experiences & lessons      learnt in securing networks and applications
	Platforms for electronic distribution of plane tickets;
	  Platforms for   electronic distribution of hotel booking;
	  Data accuracy;
	  E-trade strengths   and weaknesses;
	  Malicious spyware;
	  Blocking without quarantining the   systems/networks;
	  Out-of-band intrusion prevention;
	  Antivirus e-mail   gateways software;
	  Security and vulnerability engineering
	USSAF: User safety, privacy, and protection      over Internet
	Countermeasures on fraud prevention;
	  Trust, trust estimators, and trust   mitigation in public e-business;
	  Customer protection and serviceability   perception;
	  Privacy impacts of emergency presence   services;
	  Authentication/authorization;
	  Biometric methodologies and ID   Cards;
	  Security on hardware and smart cards;
	  Identity   management;
	  Automated security analysis;
	  Electronic Privacy;
	  Anonymity and   pseudo-anonymity;
	  Security compliance;
	  Public safety, Instance   messages;
	  Presence protocols;
	  Priority user service
	SYVUL: Systems vulnerabilities
	Vulnerability specification languages;
	  System vulnerability assessment;
	  Formal methods for safety-critical systems;
	  Prediction capabilities of   vulnerability discovery models;
	  Highly vulnerable systems;
	  Critical   vulnerabilities;
	  Errors and configurations leading to   vulnerabilities;
	  Incident reports and handling;
	  Networks resiliency   methods;
	  Capacity planning for resilience and emergency;
	  Operational   resilience;
	  Theory of disaster-tolerant systems;
	  Web service   vulnerability;
	  Protocol vulnerability; Vulnerabilities in database   systems;
	  Vulnerability in control systems;
	  Vulnerability analysis and.   requirements for the security;
	  Vulnerabilities by self-managed   sensors;
	  Recovery by disruption resource procedures;
	  Common vulnerability   scoring systems;
	  Cost models and vulnerability business impact
	SYDIA: Systems diagnosis
	Diagnosis platforms;
	  Diagnosis policy language;
	  Diagnosis event   formats;
	  Process algebras for systems diagnosis;
	  Probabilistic diagnosis of   multiprocessor systems;
	  Self-diagnosis in distributed systems;
	  Cognitive   system diagnosis;
	  System diagnosis using propagation models;
	  Technical   intuition in systems diagnosis;
	  Managing conflicts in systems   diagnosis;
	  Hybrid systems diagnosis;
	  Diagnosis tools;
	  End-to-end   diagnosis;
	  Remote system diagnosis;
	  Diagnosis licensing;
	  Real-time symptom   detection and fixing actions;
	  Forensic/real-time/anticipative   diagnosis;
	  Diagnosing mobility-oriented systems;
	  Diagnosis of discrete event   systems;
	  Diagnosis of complex dynamical systems
	CYBER-FRAUD: Cyber fraud
	Epidemiological models for warware and cyber-crime propagation;
	  Record and   retrieval of cyber-crimes;
	  Forensic analysis;
	  Cyber-crime   prevention;
	  Cyber-crime vulnerabilities;
	  Cyber-counterattack at   source;
	  Distributed cyber-attacks;
	  Orchestrated cyber-attacks;
	  Recursion   attacks;
	  Cyber-storm attacks;
	  Spyware and malware;
	  Cyber-pranks,   hoaxes;
	  Phishing/Pharming and anti-phishing;
	  Cyber-terrorism;
	  Online   cyber-crime reporting;
	  Accuracy and security of cyber-reports;
	  Fighting   cyber-crimes;
	  Cyber-crime laws
	BUSINESS: Business   continuity
	Regulatory compliance;
	  Techniques for business continuity planning in the real   world;
	  Business contingency and resumption planning;
	  Emotional continuity   management;
	  Semiotic engineering of online services;
	  Emergency   preparedness for industry and commerce;
	  Updating, auditing and testing   plans;
	  Reduce downtime with continuous backup;
	  Global connectivity and   international formats;
	  Web-based planning tools;
	  Automatic high speed   notification and response for business continuity;
	  Centralized management;
	  Businesses continuity planning software;
	  On-demand business transformation
	RISK: Risk   assessment
	Risk assessment information systems;
	  Modeling risk assessment;
	  Risk   Assessment methods;
	  Global risk assessment;
	  Qualitative risk   assessments;
	  Quantitative risk assessment;
	  Challenges in risk assessment;
	  Risk assessment for economy;
	  Risk assessment for security of   communications systems;
	  Safety risk assessment;
	  Health system risk   assessment;
	  Integrated risk assessment;
	  Planning tools for proactive risk   assessment;
	  Risk management;
	  Risk factors and economic impact;
	  Risk   metrics and calibration;
	  Precaution and risk balance;
	  Risk and economic   analysis of terrorism events;
	  Risk analysis for extreme events;
	  Life cycle   assessment in decision making;
	  Environmental risk assessment;
	  Credit   ratings risk assessment;
	  Risk Assessment statistics & numerical   data;
	  Risk assessment standards;
	  Risk assessment tools and support software
	TRUST: Privacy   and trust in pervasive communications
	Trust development and management;
	  Engineering requirements for trust   management;
	  Formalisms for trust specification, verification and   validation;
	  Logics for the analysis of trust and for reasoning about   trust;
	  Legal framework for online trust environments;
	  Trust in semantic Web   services;
	  Reputation systems;
	  Distributed trust management;
	  Trust on   anonymous documents;
	  Privacy and trust;
	  Trust in collaborative work and risk   assessment;
	  Risk analysis to assess user trust;
	  Human behaviors in trusted   environments;
	  Trust in virtual communities;
	  Trust mediation in knowledge   management;
	  Trust planning and evaluation metrics;
	  Trust policies;
	  Self-adaptable trust mechanisms;
	  Identity Management in pervasive   environments (requirements, levels of abstractions, context, protection, etc.);
	  Assurance (compliance, assurance, audit, security requirements)
	RIGHT: Digital   rights management
	Ontology and frameworks on digital rights management;
	  Digital rights property   languages;
	  Semantic and encoding of digital rights;
	  Rights   granularity;
	  Digital right technologies;
	  Digital rights management   schemes;
	  Federated digital rights management;
	  Distributed digital rights   management;
	  Copyright protection schemes;
	  Digital rights management ands   social norms;
	  Faire use, innovation, and competition;
	  Trading fair use for   digital rights management;
	  Digital rights management and open   access;
	  Privacy engineering for digital rights management;
	  Value-centered   design for digital rights management;
	  Free software and digital rights   management;
	  P2P and digital rights management;
	  Broadband/IPTV content   protection and digital rights management;
	  Digital right management and content   licensing;
	  Digital rights management issues in real-time and safety/mission   systems;
	  RFID tags for digital rights management;
	  Digital rights   management in learning systems;
	  Legal policy and digital right management
	BIOTEC:   Biometric techniques
	Models and techniques for biometric technologies;
	  Finger, facial, iris, voice,   and skin biometrics;
	  Biometric security;
	  Signature recognition;
	  Multimodal biometrics;
	  Verification and identification techniques;
	  Accuracy of biometric technologies;
	  Authentication smart cards and   biometric metrics;
	  Performance and assurance testing;
	  Limitations of   biometric technologies;
	  Biometric card technologies;
	  Biometric wireless   technologies;
	  Biometric software and hardware;
	  Biometric standards
	EMDRM: Enterprise & Media DRM
	Digital Policy Management;
	  Enterprise Rights Management (adoption and case   studies);
	  DRM Interoperability;
	  Operational Risk Management;
	  Compliance   and Regulatory Frameworks (SOX, Basel II, HIPPA, etc.);
	  Corporate   Governance;
	  Content and Knowledge Management (financial, CAD, IP, trade   secrets, etc.);
	  Interorganizational System (IOS);
	  Retention Policies and   Classification;
	  Traceability, Monitoring, tracking, usage metering, audit   trails
	
Deadlines:
	
              Submission  |         Apr 07, 2023  |       
              Notification  |         May 05, 2023  |       
              Registration  |         May 19, 2023  |       
              Camera ready  |         May 26, 2023  |       
    
Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).