IEEE S&P 2019 4th International Workshop on Traffic Measurements for
Cybersecurity (WTMC 2019).
San Francisco, California
Thursday, May 23, 2019

http://wtmc.info/index.html
 
After three highly successful editions of the WTMC workshop at ACM
SIGCOMM 2018 (http://wtmc.info/index2018.html ), IEEE S&P 2017 
( http://wtmc.info/index2017.html ) and ACM ASIACCS 2016 
( http://wtmc.info/index2016.html ), we are happy to announce the 4th
edition of WTMC at IEEE S&P 2019.

The goal of the WTMC workshop is to present some of the most
relevant ongoing research in cybersecurity as seen from the network
traffic measurement perspective.
 
Accepted papers will be published in the Conference Proceedings
published by IEEE Computer Society Press. Extended versions of all
accepted papers will be considered for publication in a special issue of
the Journal of Cyber Security and Mobility (River Publishers, ISSN:
2245-1439)
 
* January 7, 2019: Regular Paper Submission*
* February 15, 2019: Notification Date*
 
***Call for Papers***

Current communication networks are increasingly becoming pervasive,
complex, and ever-evolving due to factors like enormous growth in the
number of network users, continuous appearance of network applications,
increasing amount of data transferred, and diversity of user behaviors.
Understanding and measuring traffic in such networks is a difficult yet
vital task for network management but recently also for cybersecurity
purposes. Network traffic measuring and monitoring can, for example,
enable the analysis of the spreading of malicious software and its
capabilities or can help to understand the nature of various network
threats including those that exploit users’ behavior and other user’s
sensitive information. On the other hand network traffic investigation
can also help to assess the effectiveness of the existing
countermeasures or contribute to building new, better ones. Recently,
traffic measurements have been utilized in the area of economics of
cybersecurity e.g. to assess ISP “badness” or to estimate the revenue of
cyber criminals. 

The aim of this workshop is to bring together the research
accomplishments provided by the researchers from academia and the
industry. The other goal is to show the latest research results in the
field of cybersecurity and understand how traffic measurements can
influence it. We encourage prospective authors to submit related
distinguished research papers on the subject of both: theoretical
approaches and practical case reviews. This workshop presents some of
the most relevant ongoing research in cybersecurity seen from the
traffic measurements perspective. 

The workshop will be accessible to both non-experts interested in
learning about this area and experts interesting in hearing about new
research and approaches.

Topics of interest include, but are not limited to the following:
 
+ Measurements for network incidents response, investigation and
evidence handling
+ Measurements of cyber attacks (e.g. DDoS, botnet, malware and phishing
campaigns)
+ Measurements for security of web-based applications and services
  (e.g., social networking)
+ Measurements for network anomalies detection
+ Measurements for economics of cybersecurity and privacy
+ Measurements of security and privacy for the Internet of Things
+ Network traffic analysis to discover the nature and evolution of the
cybersecurity threats
+ Measurements for assessing the effectiveness of the threats
  detection/prevention methods and countermeasures
+ Novel passive, active and hybrid measurements techniques for
  cybersecurity purposes
+ Traffic classification and topology discovery tools for monitoring the
  evolving status of the network from the cybersecurity perspective
+ Correlation of measurements across multiple layers, protocols or
  networks for cybersecurity purposes
+ Machine learning and data mining for analysis of network traffic
  measurements for cybersecurity
+ Novel approaches for large-scale measurements for cybersecurity (e.g.
  crowd-sourcing)
+ Novel visualization approaches to detect network attacks and other 
  threats
+ Analysis of network traffic to provide new insights about network
  structure and behavior from the security perspective
+ Measurements of network protocol and applications behavior and its
  impact on cybersecurity and users' privacy
+ Vulnerability notifications
+ Measurements for new cybersecurity settings
+ Ethical issues in measurements for cybersecurity
+ Reappraisal of previous empirical findings

***Submission Instructions***
 
Papers will be accepted based on peer review (3-4 per paper) and should
contain original, high quality work. All papers must be written in 
English. 

Authors are invited to submit regular papers (maximum 6 pages)
via EasyChair <https://easychair.org/conferences/?conf=wtmc2019>. Papers
must be formatted for US letter (not A4) size paper with margins of at
least 3/4 inch on all sides. The text must be formatted in a two-column
layout, with columns no more than 9” high and 3.375” wide. The text must
be in Times font, 10-point or larger, with 12-point or larger line
spacing. Authors are encouraged to use the IEEE conference proceedings
templates found here: Manuscript Template
http://www.ieee.org/conferences_events/conferences/publishing/templates.html .
Failure to adhere to the page limit and formatting requirements will be
grounds for rejection. 

Papers describing cybersecurity measurement studies should include an
ethical considerations paragraph, and where applicable reach out to
their institutional ethics committee or institutional review board. For
guidance see the Menlo Report
https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803.pdf and
its companion document
https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCOMPANION-20120103-r731_0.pdf . 

Authors are encouraged to share developed software implementations,
measurement datasets, simulation models, etc. used in articles allowing
other researchers to build upon and extend current results. Authors may
include a paragraph about reproducible research. 

Submission page: https://easychair.org/conferences/?conf=wtmc2019

Submission of a paper implies that should the paper be accepted, at
least one of the authors will register and present the paper in the
conference. 

Papers accepted by the workshop will be published in the Conference
Proceedings published by IEEE Computer Society Press. The extended
versions of all accepted papers will be considered for publication in a
special issue of the *Journal of Cyber Security and Mobility*
http://riverpublishers.com/journal.php?j=JCSM/2/2 (confirmed). The
decision will depend on the quality of the paper and quality of the
presentation at WTMC 2019. The final decision will be made by co-chairs
after the workshop.

***Workshop Co-Chairs***
 
+ Maciej Korczyński - Grenoble Institute of Technology, France
+ Wojciech Mazurczyk - Warsaw University of Technology, Poland
+ Pedro Casas - Austrian Institute of Technology, Austria
 
***Steering Committee***

+ KC Claffy, CAIDA, USA
+ Aiko Pras, University of Twente, the Netherlands
+ Kensuke Fukuda, National Institute of Informatics, Japan