The 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

DIMVA 2009

Submission Page


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


To make a new submission, please fill in the form below, and then press the submit button at the bottom.


Title of Submission:  


List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Affiliation
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20

More authors      Fewer authors


Contact Informaton:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
Country*
Address 
Address 
Address 
City/Town*
Zip/Postal Code*


Conflicts of Interest:

Please identify all potential committee members and reviewers who should not review this submission, due to having a conflict of interest with you or any of your co-authors. It is crucial that you fill in this section as carefully as possible, and that you do so in consultation with all of your co-authors. For more information on how to determine your conflicts of interest, please see the author guidelines posted at the website for DIMVA.

Reviewer checklist: Please carefully examine the list of names below, and check-off any of the people who should not review this submission, due to a conflict of interest with one of the authors. (This also includes the names of any co-authors, if they appear below.)

 Anonymous Anonymous     Anonymous2 Anonymous2     Thomas Biege     Gunter Bitz   
 Herbert Bos     Danilo Bruschi     Roland Büschkes     Marc Dacier   
 Hervé Debar     Sven Dietrich     Toralv Dirro     Thomas Dullien   
 Ulrich Flegel     Marc Heuse     Thorsten Holz     Bernhard Hämmerli   
 Erland Jonsson     Klaus Julisch     Engin Kirda     Christian Kreibich   
 Christopher Kruegel     Pavel Laskov     Wenke Lee     Javier Lopez   
 John McHugh     Michael Meier     George Mohay     Martin Rehák   
 Konrad Rieck     Sebastian Schmerl     Asia Slowinska     Robin Sommer   
 Salvatore Stolfo     Peter Szor     Peter Szor     Bernhard Thurm   
 Al Valdes   

Additional conflicts: The committee may call on external reviewers to help evaluate your submission. These reviewer names may not appear in the list above. Therefore, we also request that you identify any other conflicts of interest you can think of. Specifically, you should list anybody you know of who works in an area related to DIMVA, and who has a conflict of interest with either you or one of your co-authors. (You do not need to include your own author names in this list.)

First name Last name Email Affiliation
#1
#2
#3
#4
#5
#6
#7
#8
#9
#10
#11
#12
#13
#14
#15
#16
#17
#18
#19
#20
#21
#22
#23
#24
#25
#26
#27
#28
#29
#30

More Conflicts      Fewer Conflicts


Submission Category:

Please enter the category under which the submission should be reviewed.

Submission Type:  


Abstract:

Type (or cut-and-paste) a short abstract for your submission. You must enter plain text only.

 


Submit Paper:

Your submission must be in Adobe PDF (pdf) format, and the file name should end with the appropriate MIME extent (i.e., "pdf".). For example, your file could have a name such as "mypaper.pdf".

Find the file containing your submission: 


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

Intrusion Detection  
Intrusion detection approaches
Insider detection
Applications to business level fraud
Intrusion detection implementations
Prevention and response
Result correlation and cooperation
Evaluation
Potentials and limitations
Operational experiences
Legal and social aspects
Malware Detection  
Detection Techniques
Acquisition of specimen
Detection and analysis
Automated behavior model generation
Early warning
Prevention and containment
Trends and upcoming risks
Forensics and recovery
Economic aspects
Vulnerability Assessment  
Vulnerabilities
Vulnerability detection and analysis
Vulnerability prevention
Classification and evaluation
Situational awareness
 
 



START Conference Manager (V2.61.0 - Rev. 6236M)