<html>
<head>
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
h2
{mso-style-priority:9;
mso-style-link:"Heading 2 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:18.0pt;
font-family:"Times New Roman",serif;
font-weight:bold;}
h3
{mso-style-priority:9;
mso-style-link:"Heading 3 Char";
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:13.5pt;
font-family:"Times New Roman",serif;
font-weight:bold;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.Heading2Char
{mso-style-name:"Heading 2 Char";
mso-style-priority:9;
mso-style-link:"Heading 2";
font-family:"Times New Roman",serif;
font-weight:bold;}
span.Heading3Char
{mso-style-name:"Heading 3 Char";
mso-style-priority:9;
mso-style-link:"Heading 3";
font-family:"Times New Roman",serif;
font-weight:bold;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle21
{mso-style-type:personal;
font-family:"Calibri",sans-serif;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle23
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:578171882;
mso-list-template-ids:-1865116650;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1
{mso-list-id:1954822595;
mso-list-template-ids:1192650362;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body vlink="#954F72" text="#000000" link="#0563C1" lang="EN-US"
bgcolor="#FFFFFF">
<div class="WordSection1">
<div align="center"><b>**** Submission deadline Dec. 15, 2018
****</b><br>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<h2 style="text-align:center" align="center"><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black">5</span><sup><span
style="font-size:7.5pt;font-family:"Verdana",sans-serif;color:black">TH</span></sup><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black"> IEEE/IFIP
Workshop on Security for Emerging Distributed Network
Technologies (DISSECT)<o:p></o:p></span></h2>
<h3 style="text-align:center;font-variant-ligatures:

normal;font-variant-caps: normal;orphans: 2;widows:

2;-webkit-text-stroke-width: 0px;text-decoration-style:

initial;text-decoration-color: initial;word-spacing:0px"
align="center"> <i><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">Security
for the Next Wave of Cyber and Social Networks</span></i><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black"><o:p></o:p></span></h3>
<h3 style="text-align:center;font-variant-ligatures:

normal;font-variant-caps: normal;orphans: 2;widows:

2;-webkit-text-stroke-width: 0px;text-decoration-style:

initial;text-decoration-color: initial;word-spacing:0px"
align="center"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black"><a
href="http://www.ieee-im.org/" moz-do-not-send="true"><span
style="color:#0073AE">Co-located with IEEE/IFIP IM 2019</span></a><br>
Washington D.C., USA<o:p></o:p></span></h3>
<p style="text-align:justify"><span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">The
computer networking landscape is subject to a multitude of
changes that occur very rapidly. First, paradigm shifts such
as fog computing, mobile edge computing, Named Data Networking
(NDN) and emerging open networking technologies such as
Software-Defined Networking (SDN), Network Function
Virtualization (NFV), and Programmable Networks are reshaping
the way networks are designed, deployed, and managed. The
benefits are manifold, including an unprecedented flexibility
for network operation and management, and a favorable
environment for delivering innovative network applications and
services. However, those paradigm shifts bring a multitude of
security challenges that have to be addressed in order to
provide secure, trustworthy, and privacy-preserving data
communication and network services. Second, large scale and
distributed deployment of mobile communications,
Internet-of-Things (IoT), Intelligent Transport Systems, smart
grids or industrial systems has become real but also
emphasizes particular privacy and security issues to be
overcome, especially when interconnected with Internet.<o:p></o:p></span></p>
<p style="text-align:justify;font-variant-ligatures:

normal;font-variant-caps: normal;orphans: 2;widows:

2;-webkit-text-stroke-width: 0px;text-decoration-style:

initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">Addressing
all these challenges may require not only revisiting existing
solutions (e.g., for intrusion detection, privacy preserving,
and resilience against attacks), but also designing novel
security and resilience schemes tailored to the specific
design of open networking technologies and infrastructures.
New types of attacks and threats also appear against usual
services over Internet such as DNS or routing. DISSECT 2019
follows the track of its four previous editions, and will put
focus on security issues and challenges arising with the
emergence of novel networking technologies and paradigms but
also on new threats emerging against former services and
technologies, towards a secure cognitive management in a
cyber-world. The workshop will shed light on new challenges
and present state-of-the-art research on the various security
aspects of next-generation networking technologies and service
management frameworks.<o:p></o:p></span></p>
<p style="text-align:justify;font-variant-ligatures:

normal;font-variant-caps: normal;orphans: 2;widows:

2;-webkit-text-stroke-width: 0px;text-decoration-style:

initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">DISSECT
will offer a venue for bringing together students,
researchers, and professionals from academia and industry
sharing common interest on security challenges related to the
design and management of the distributed networks and
infrastructures. DISSECT is intended to (1) discussing these
challenges as well as future trends on security management,
(2) presenting and discussing work-in-progress
security-related research on cutting-edge technologies, and
(3) strengthening collaboration and research ties among peers.<o:p></o:p></span></p>
<h2 style="text-align:justify"><span
style="font-size:11.5pt;font-family:"Verdana",sans-serif;color:black">Topics
of Interest<o:p></o:p></span></h2>
<p style="text-align:justify;font-variant-ligatures:

normal;font-variant-caps: normal;orphans: 2;widows:

2;-webkit-text-stroke-width: 0px;text-decoration-style:

initial;text-decoration-color: initial;word-spacing:1.8px"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif;color:black">The
research community will be invited to contribute with
manuscripts describing novel, work-in-progress research on the
design of solutions to relevant security issues on a wide
variety of next generation networking technologies. The topics
of interest include, but are not limited to, the following<o:p></o:p></span></p>
<ul type="square">
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure
and resilient design and deployment of open networking
technologies<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Privacy-preserving
solutions<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
models and threats<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
and privacy properties and policies<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Verification
and enforcement of security properties<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Trust
and identity management<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">NFV-based
security functions and services<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
of software-defined infrastructures, protocols and
interfaces<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Threat
modeling<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
measurement and monitoring<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Industrial
Control System security<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
and availability management<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
for Internet of Things<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Intrusion
detection, resilience, and prevention<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Honeypots<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Network
forensics and auditing<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Detection
and resilience against large-scale distributed attacks<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
of programmable components<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security-related
business and legal aspects<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Security
challenges and trends for open networking technologies<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Secure
programmable data plane<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Collaborative
intrusion detection<o:p></o:p></span></li>
<li class="MsoNormal"
style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0

level1 lfo3"> <span
style="font-size:9.0pt;font-family:"Verdana",sans-serif">Blockchain
and distributed consensus<o:p></o:p></span></li>
</ul>
<p class="MsoNormal"><b><span style="font-size:16.0pt">Important
Dates<o:p></o:p></span></b></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b>-Dec. 15, 2018 Paper submission Deadline<o:p></o:p></b></p>
<p class="MsoNormal">-Jan. 5, 2019 Acceptance Notification<o:p></o:p></p>
<p class="MsoNormal">-Jan. 25, 2019 Camera-Ready Version Due<o:p></o:p></p>
<p class="MsoNormal">-Apr. 8, 2019 Workshop Day<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">More information can be found here: <a
href="http://www.inf.ufrgs.br/dissect/2019"
moz-do-not-send="true"> http://www.inf.ufrgs.br/dissect/2019</a><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>