PRIMORIS      Contacts      FAQs      INSTICC Portal


The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations, poster presentations, keynote lectures and panels. Depending on the number of presentations, workshops can be scheduled for 1 day or 2 days. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on CD-ROM support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

Workshop proposals are accepted until:

April 10, 2017

If you wish to propose a new Workshop please kindly fill out and submit this Expression of Interest form.


WCTS 2017Wireless Cloud-based Technologies and Systems (ICETE)
Chair(s): Pedro Pinto and Luís Barreto

TAIM 2017Workshop on Technical Approaches for Insider Mitigation (ICETE)
Chair(s): Jason Clark and William (Bill) Claycomb

Wireless Cloud-based Technologies and Systems - WCTS 2017

Paper Submission: April 26, 2017
Authors Notification: May 15, 2017
Camera Ready and Registration: May 29, 2017


Pedro Pinto
Polytechnic Institute of Viana do Castelo and INESC TEC
Luís Barreto
Polytechnic Institute of Viana do Castelo

The scope of the workshop will be dedicated to the new approaches concerning wireless cloud technologies, experiments, modeling and theoretical approaches to cover all aspects from the fundamentals to the applications beyond. This workshop allows to share and discuss the current challenges that researchers and corporations are facing towards designing and implementing wireless cloud-based architectures and also providing services and applications on top of these networks.

• Internet of Things;
• Network function virtualization;
• Software-defined networking;
• Reliability and availability for Wireless cloud-based services;
• Consistency and transparency for Wireless cloud-based services;
• Trust and security of wireless cloud-based services;
• Cloud-based mobile systems and services;
• Architecture for Internet-based virtual computing environments.

Workshop on
Technical Approaches for Insider Mitigation
 - TAIM 2017

Paper Submission: April 26, 2017
Authors Notification: May 15, 2017
Camera Ready and Registration: May 29, 2017


Jason Clark
Carnegie Mellon University / SEI
United States
William (Bill) Claycomb
Carnegie Mellon University
United States

Insider threats are a present and growing concern to organizations worldwide. Trusted employees have the capability for inflicting devastating consequences to their employer’s assets, data, and IT infrastructure, primarily because of their detailed knowledge and authorized access these systems. This workshop focuses on technical approaches and applications for detecting and mitigating insider activity, which may include unintentional as well as malicious behavior. We invite researchers with the aim of sharing algorithms, anomaly detection techniques, creation of reliable test data, software applications for detecting suspicious activity, active and passive indicators, visualization methods, statistical measures, and recent results.
Topics include, but are not limited to: malicious behavior detection algorithms, active and passive indicators, anomaly detection, predictive analytics, visualization, software development and testing methods, innovative statistical measures to measure efficacy, realistic data set creation, data sharing techniques, novel software-based technologies, integration of multiple software applications, repurposing of existing technology for insider threat detection, and case studies showing proof of concept of technical solutions.