<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
color:black;}
h2
{mso-style-priority:9;
mso-style-link:"Heading 2 Char";
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:18.0pt;
font-family:"Times New Roman",serif;
color:black;
font-weight:bold;}
h3
{mso-style-priority:9;
mso-style-link:"Heading 3 Char";
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:13.5pt;
font-family:"Times New Roman",serif;
color:black;
font-weight:bold;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman",serif;
color:black;}
span.Heading2Char
{mso-style-name:"Heading 2 Char";
mso-style-priority:9;
mso-style-link:"Heading 2";
font-family:"Times New Roman",serif;
font-weight:bold;}
span.Heading3Char
{mso-style-name:"Heading 3 Char";
mso-style-priority:9;
mso-style-link:"Heading 3";
font-family:"Times New Roman",serif;
font-weight:bold;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman",serif;
color:black;}
span.EmailStyle21
{mso-style-type:personal;
font-family:"Calibri",sans-serif;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle23
{mso-style-type:personal;
font-family:"Calibri",sans-serif;}
span.EmailStyle24
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:578171882;
mso-list-template-ids:-1865116650;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1
{mso-list-id:1776092011;
mso-list-template-ids:-1179248684;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor="white" lang="EN-CA" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" align="center" style="text-align:center"><b><span lang="EN-US" style="font-size:12.0pt;font-family:"Times New Roman",serif">**** Extended Submission deadline: January 5, 2018 ****<o:p></o:p></span></b></p>
<p class="MsoNormal"><span lang="EN-US"> <o:p></o:p></span></p>
<h2 align="center" style="text-align:center"><span lang="EN-US" style="font-size:11.5pt;font-family:"Verdana",sans-serif">5</span><sup><span lang="EN-US" style="font-size:7.5pt;font-family:"Verdana",sans-serif">TH</span></sup><span lang="EN-US" style="font-size:11.5pt;font-family:"Verdana",sans-serif"> IEEE/IFIP
Workshop on Security for Emerging Distributed Network Technologies (DISSECT)</span><span lang="EN-US"><o:p></o:p></span></h2>
<h3 align="center" style="text-align:center;font-variant-ligatures:
normal;font-variant-caps: normal;orphans: 2;widows:
2;-webkit-text-stroke-width:
0px;text-decoration-style:
initial;text-decoration-color: initial;word-spacing:0px">
<i><span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security for the Next Wave of Cyber and Social Networks</span></i><span lang="EN-US"><o:p></o:p></span></h3>
<h3 align="center" style="text-align:center;font-variant-ligatures:
normal;font-variant-caps: normal;orphans: 2;widows:
2;-webkit-text-stroke-width:
0px;text-decoration-style:
initial;text-decoration-color: initial;word-spacing:0px">
<a href="http://www.ieee-im.org/"><span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:#0073AE">Co-located with IEEE/IFIP IM 2019</span></a><span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif"><br>
Washington D.C., USA</span><span lang="EN-US"><o:p></o:p></span></h3>
<p style="text-align:justify"><span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">The computer networking landscape is subject to a multitude of changes that occur very rapidly. First, paradigm shifts such as fog computing, mobile edge
computing, Named Data Networking (NDN) and emerging open networking technologies such as Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Programmable Networks are reshaping the way networks are designed, deployed, and managed.
The benefits are manifold, including an unprecedented flexibility for network operation and management, and a favorable environment for delivering innovative network applications and services. However, those paradigm shifts bring a multitude of security challenges
that have to be addressed in order to provide secure, trustworthy, and privacy-preserving data communication and network services. Second, large scale and distributed deployment of mobile communications, Internet-of-Things (IoT), Intelligent Transport Systems,
smart grids or industrial systems has become real but also emphasizes particular privacy and security issues to be overcome, especially when interconnected with Internet.</span><span lang="EN-US"><o:p></o:p></span></p>
<p style="text-align:justify;font-variant-ligatures:
normal;font-variant-caps: normal;orphans: 2;widows:
2;-webkit-text-stroke-width:
0px;text-decoration-style:
initial;text-decoration-color: initial;word-spacing:1.8px">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Addressing all these challenges may require not only revisiting existing solutions (e.g., for intrusion detection, privacy preserving, and resilience against attacks), but also designing
novel security and resilience schemes tailored to the specific design of open networking technologies and infrastructures. New types of attacks and threats also appear against usual services over Internet such as DNS or routing. DISSECT 2019 follows the track
of its four previous editions, and will put focus on security issues and challenges arising with the emergence of novel networking technologies and paradigms but also on new threats emerging against former services and technologies, towards a secure cognitive
management in a cyber-world. The workshop will shed light on new challenges and present state-of-the-art research on the various security aspects of next-generation networking technologies and service management frameworks.</span><span lang="EN-US"><o:p></o:p></span></p>
<p style="text-align:justify;font-variant-ligatures:
normal;font-variant-caps: normal;orphans: 2;widows:
2;-webkit-text-stroke-width:
0px;text-decoration-style:
initial;text-decoration-color: initial;word-spacing:1.8px">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">DISSECT will offer a venue for bringing together students, researchers, and professionals from academia and industry sharing common interest on security challenges related to the design
and management of the distributed networks and infrastructures. DISSECT is intended to (1) discussing these challenges as well as future trends on security management, (2) presenting and discussing work-in-progress security-related research on cutting-edge
technologies, and (3) strengthening collaboration and research ties among peers.</span><span lang="EN-US"><o:p></o:p></span></p>
<h2 style="text-align:justify"><span lang="EN-US" style="font-size:11.5pt;font-family:"Verdana",sans-serif">Topics of Interest</span><span lang="EN-US"><o:p></o:p></span></h2>
<p style="text-align:justify;font-variant-ligatures:
normal;font-variant-caps: normal;orphans: 2;widows:
2;-webkit-text-stroke-width:
0px;text-decoration-style:
initial;text-decoration-color: initial;word-spacing:1.8px">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">The research community will be invited to contribute with manuscripts describing novel, work-in-progress research on the design of solutions to relevant security issues on a wide variety
of next generation networking technologies. The topics of interest include, but are not limited to, the following</span><span lang="EN-US"><o:p></o:p></span></p>
<ul type="square">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure and resilient design and deployment of open networking technologies</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Privacy-preserving solutions</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security models and threats</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security and privacy properties and policies</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Verification and enforcement of security properties</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Trust and identity management</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">NFV-based security functions and services</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security of software-defined infrastructures, protocols and interfaces</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Threat modeling</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security measurement and monitoring</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Industrial Control System security</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security and availability management</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security for Internet of Things</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Intrusion detection, resilience, and prevention</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Honeypots</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Network forensics and auditing</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Detection and resilience against large-scale distributed attacks</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security of programmable components</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security-related business and legal aspects</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security challenges and trends for open networking technologies</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure programmable data plane</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Collaborative intrusion detection</span><span lang="EN-US"><o:p></o:p></span></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3">
<span lang="EN-US" style="font-size:9.0pt;font-family:"Verdana",sans-serif">Blockchain and distributed consensus</span><span lang="EN-US"><o:p></o:p></span></li></ul>
<p class="MsoNormal"><b><span lang="EN-US" style="font-size:16.0pt">Important Dates</span></b><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US"> <o:p></o:p></span></p>
<p class="MsoNormal"><b><span lang="EN-US">-Jan. 5, 2018 Paper submission Deadline (Extended)<o:p></o:p></span></b></p>
<p class="MsoNormal"><span lang="EN-US">-Jan. 20, 2019 Acceptance Notification<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US">-Jan. 25, 2019 Camera-Ready Version Due<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US">-Apr. 8, 2019 Workshop Day<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US"> <o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US">More information can be found here: </span>
<a href="http://www.inf.ufrgs.br/dissect/2019"><span lang="EN-US">http://www.inf.ufrgs.br/dissect/2019</span></a><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal"><span lang="EN-US"> <o:p></o:p></span></p>
</div>
</body>
</html>