<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html;
      charset=windows-1252">
    <meta name="Generator" content="Microsoft Word 15 (filtered medium)">
    <style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Verdana;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
h2
        {mso-style-priority:9;
        mso-style-link:"Heading 2 Char";
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:18.0pt;
        font-family:"Times New Roman",serif;
        font-weight:bold;}
h3
        {mso-style-priority:9;
        mso-style-link:"Heading 3 Char";
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:13.5pt;
        font-family:"Times New Roman",serif;
        font-weight:bold;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
span.Heading2Char
        {mso-style-name:"Heading 2 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 2";
        font-family:"Times New Roman",serif;
        font-weight:bold;}
span.Heading3Char
        {mso-style-name:"Heading 3 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 3";
        font-family:"Times New Roman",serif;
        font-weight:bold;}
p.msonormal0, li.msonormal0, div.msonormal0
        {mso-style-name:msonormal;
        mso-style-priority:99;
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:12.0pt;
        font-family:"Times New Roman",serif;}
span.EmailStyle21
        {mso-style-type:personal;
        font-family:"Calibri",sans-serif;}
span.EmailStyle22
        {mso-style-type:personal;
        font-family:"Calibri",sans-serif;
        color:#1F497D;}
span.EmailStyle23
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:578171882;
        mso-list-template-ids:-1865116650;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1
        {mso-list-id:1954822595;
        mso-list-template-ids:1192650362;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level2
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level5
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level8
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
  </head>
  <body vlink="#954F72" text="#000000" link="#0563C1" lang="EN-US"
    bgcolor="#FFFFFF">
    <div class="WordSection1">
      <div align="center"><b>**** Submission deadline Dec. 15, 2018 
          ****</b><br>
      </div>
      <p class="MsoNormal"><o:p> </o:p></p>
      <h2 style="text-align:center" align="center"><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black">5</span><sup><span
style="font-size:7.5pt;font-family:"Verdana",sans-serif;color:black">TH</span></sup><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black"> IEEE/IFIP
          Workshop on Security for Emerging Distributed Network
          Technologies (DISSECT)<o:p></o:p></span></h2>
      <h3 style="text-align:center;font-variant-ligatures:&#xA;
        normal;font-variant-caps: normal;orphans: 2;widows:&#xA;
        2;-webkit-text-stroke-width: 0px;text-decoration-style:&#xA;
        initial;text-decoration-color: initial;word-spacing:0px"
        align="center"> <i><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">Security
            for the Next Wave of Cyber and Social Networks</span></i><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black"><o:p></o:p></span></h3>
      <h3 style="text-align:center;font-variant-ligatures:&#xA;
        normal;font-variant-caps: normal;orphans: 2;widows:&#xA;
        2;-webkit-text-stroke-width: 0px;text-decoration-style:&#xA;
        initial;text-decoration-color: initial;word-spacing:0px"
        align="center"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black"><a
            href="http://www.ieee-im.org/" moz-do-not-send="true"><span
              style="color:#0073AE">Co-located with IEEE/IFIP IM 2019</span></a><br>
          Washington D.C., USA<o:p></o:p></span></h3>
      <p style="text-align:justify"><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">The
          computer networking landscape is subject to a multitude of
          changes that occur very rapidly. First, paradigm shifts such
          as fog computing, mobile edge computing, Named Data Networking
          (NDN) and emerging open networking technologies such as
          Software-Defined Networking (SDN), Network Function
          Virtualization (NFV), and Programmable Networks are reshaping
          the way networks are designed, deployed, and managed. The
          benefits are manifold, including an unprecedented flexibility
          for network operation and management, and a favorable
          environment for delivering innovative network applications and
          services. However, those paradigm shifts bring a multitude of
          security challenges that have to be addressed in order to
          provide secure, trustworthy, and privacy-preserving data
          communication and network services. Second, large scale and
          distributed deployment of mobile communications,
          Internet-of-Things (IoT), Intelligent Transport Systems, smart
          grids or industrial systems has become real but also
          emphasizes particular privacy and security issues to be
          overcome, especially when interconnected with Internet.<o:p></o:p></span></p>
      <p style="text-align:justify;font-variant-ligatures:&#xA;
        normal;font-variant-caps: normal;orphans: 2;widows:&#xA;
        2;-webkit-text-stroke-width: 0px;text-decoration-style:&#xA;
        initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">Addressing
          all these challenges may require not only revisiting existing
          solutions (e.g., for intrusion detection, privacy preserving,
          and resilience against attacks), but also designing novel
          security and resilience schemes tailored to the specific
          design of open networking technologies and infrastructures.
          New types of attacks and threats also appear against usual
          services over Internet such as DNS or routing. DISSECT 2019
          follows the track of its four previous editions, and will put
          focus on security issues and challenges arising with the
          emergence of novel networking technologies and paradigms but
          also on new threats emerging against former services and
          technologies, towards a secure cognitive management in a
          cyber-world. The workshop will shed light on new challenges
          and present state-of-the-art research on the various security
          aspects of next-generation networking technologies and service
          management frameworks.<o:p></o:p></span></p>
      <p style="text-align:justify;font-variant-ligatures:&#xA;
        normal;font-variant-caps: normal;orphans: 2;widows:&#xA;
        2;-webkit-text-stroke-width: 0px;text-decoration-style:&#xA;
        initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">DISSECT
          will offer a venue for bringing together students,
          researchers, and professionals from academia and industry
          sharing common interest on security challenges related to the
          design and management of the distributed networks and
          infrastructures. DISSECT is intended to (1) discussing these
          challenges as well as future trends on security management,
          (2) presenting and discussing work-in-progress
          security-related research on cutting-edge technologies, and
          (3) strengthening collaboration and research ties among peers.<o:p></o:p></span></p>
      <h2 style="text-align:justify"><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black">Topics
          of Interest<o:p></o:p></span></h2>
      <p style="text-align:justify;font-variant-ligatures:&#xA;
        normal;font-variant-caps: normal;orphans: 2;widows:&#xA;
        2;-webkit-text-stroke-width: 0px;text-decoration-style:&#xA;
        initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">The
          research community will be invited to contribute with
          manuscripts describing novel, work-in-progress research on the
          design of solutions to relevant security issues on a wide
          variety of next generation networking technologies. The topics
          of interest include, but are not limited to, the following<o:p></o:p></span></p>
      <ul type="square">
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure
            and resilient design and deployment of open networking
            technologies<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Privacy-preserving
            solutions<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            models and threats<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            and privacy properties and policies<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Verification
            and enforcement of security properties<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Trust
            and identity management<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">NFV-based
            security functions and services<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            of software-defined infrastructures, protocols and
            interfaces<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Threat
            modeling<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            measurement and monitoring<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Industrial
            Control System security<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            and availability management<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            for Internet of Things<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Intrusion
            detection, resilience, and prevention<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Honeypots<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Network
            forensics and auditing<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Detection
            and resilience against large-scale distributed attacks<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            of programmable components<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security-related
            business and legal aspects<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
            challenges and trends for open networking technologies<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure
            programmable data plane<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Collaborative
            intrusion detection<o:p></o:p></span></li>
        <li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0&#xA;
          level1 lfo3"> <span
            style="font-size:9.0pt;font-family:"Verdana",sans-serif">Blockchain
            and distributed consensus<o:p></o:p></span></li>
      </ul>
      <p class="MsoNormal"><b><span style="font-size:16.0pt">Important
            Dates<o:p></o:p></span></b></p>
      <p class="MsoNormal"><o:p> </o:p></p>
      <p class="MsoNormal"><b>-Dec. 15, 2018 Paper submission Deadline<o:p></o:p></b></p>
      <p class="MsoNormal">-Jan. 5, 2019 Acceptance Notification<o:p></o:p></p>
      <p class="MsoNormal">-Jan. 25, 2019 Camera-Ready Version Due<o:p></o:p></p>
      <p class="MsoNormal">-Apr. 8, 2019 Workshop Day<o:p></o:p></p>
      <p class="MsoNormal"><o:p> </o:p></p>
      <p class="MsoNormal">More information can be found here: <a
          href="http://www.inf.ufrgs.br/dissect/2019"
          moz-do-not-send="true"> http://www.inf.ufrgs.br/dissect/2019</a><o:p></o:p></p>
      <p class="MsoNormal"><o:p> </o:p></p>
    </div>
  </body>
</html>