| CARVIEW |
Organization
About ITASEC19
The 2019 edition will take place in Pisa, from February 12th to February 15th; it will gather Italian researchers and professionals working in the field of cybersecurity, from both private and public sectors and include academia, industries, research institutions, and government.
SAVE THE DATE
- Workshop & Tutorial Day: February 12
- Conference: February 13-15
The Workshop & Tutorial Day will consist of:
- Scientific workshops, gathering specialists on hot and advanced topics in cybersecurity;
- Tutorials,
focusing on cybersecurity related aspects of potential interest to the conference attendees at large.
The Conference will include parallel and concurrent tracks:
- Scientific & Technical track, with scientific and technical contributions on all the aspects of cybersecurity, including interdisciplinary and multidisciplinary hot topics;
- Stakeholder track, that will include Keynote Speeches, Invited Talks, Vision Speeches, Panels, and Special Sessions;
- Demo track: prototypes developed by industries, and research groups will be presented;
- Start-up track: a stage for domestic cybersecurity startups;
- Vendor sessions track: commercial products from the event’s sponsors will be presented.
Registration
Registration is mandatory and the access to the conference place will be granted to registered people, only. Here in after registration can be done on site, only.
WORKSHOP AND TUTORIAL DAY– Feb 12th
It includes:
- Full access to ALL the events occurring on Feb 12th, including the Workshops and the Tutorials. The events of interest have to be selected while registering
- Conference bag
- Proceedings and teaching materials related to the selected events
- Lunch on Feb 12th
- Coffee and Tea Break on Feb 12th
- Welcome Reception on Feb 12th at the CNR location.
Costs:
- 100€: Until Jan 31th
- 150€: From Jan 31th to Feb 8th
- 250€: On-site
FULL CONFERENCE REGISTRATION– Feb 13th- 15th
It includes:
- Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
- Conference bag
- Conference proceedings
- Lunches
- Coffee and Tea Break
- Welcome Reception on Feb 12th at the CNR location.
- Social Dinner on Feb 14th at Arsenali Repubblicani, including the great spectacular show “Bosch, Brueghel, Arcimboldo”, with its magical and dream-like atmospheres that envelop the attendees and fully immerse them in the artworks through a combination of images, music, and technology.
Costs:
- 300€: Until Jan 31th
- 500€: From Jan 31th to Feb 8th
- 700€: On-site
STUDENT FULL CONFERENCE REGISTRATION– Feb 13th- 15th
It includes:
- Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
- Conference bag
- Conference proceedings
- Lunches
- Coffee and Tea Break
- Welcome Reception on Feb 12th at the CNR location.
It does not includes:
- Social Dinner on Feb 14th at Arsenali Repubblicani.
Costs:
- 200€: Until Jan 31th
- 300€: From Jan 31th to Feb 8th
- 400€: On-site
MILITARY & LAW ENFORCEMENT FORCE FULL CONFERENCE REGISTRATION– Feb 13th- 15th
It includes:
- Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
- Conference bag
- Conference proceedings
- Lunches
- Coffee and Tea Break
- Welcome Reception on Feb 12th at the CNR location.
It does not includes:
- Social Dinner on Feb 14th at Arsenali Repubblicani.
Costs:
- 200€: Until Jan 31th
- 300€: From Jan 31th to Feb 8th
- 400€: On-site
ONE-DAY FULL CONFERENCE REGISTRATION – Feb 13th, 14th, 15th
It includes:
- Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
- Conference bag
- Conference proceedings
- Lunches
- Coffee and Tea Break
- Welcome Reception on Feb 12th at the CNR location.
It does not includes:
- Social Dinner on Feb 14th at Arsenali Repubblicani.
Costs:
- 90€: Until Jan 31th
- 150€: From Jan 31th to Feb 8th
- 150€: On-site
ONE-DAY STAKEHOLDER SPACE, ONLY, REGISTRATION– Feb 12th, 13th, 14th, 15th
It includes:
- Full access, on the chosen day only, to the events of the Stakeholder Space, to the Special Day on Start-ups (if applicable), and to the Exhibition Space
- Coffee and Tea Break on the chosen day
It does not includes:
- Conference bag
- Full access to the Scientific & Technical Track and to the Demo Track
- Conference proceedings
- Social Dinner on Feb 14th at Arsenali Repubblicani.
- Welcome Reception on Feb 12th at the CNR location.
Costs:
- Free of charge
Chairs
General co-Chairs
Marco Conti
Rocco De Nicola
Paolo Prinetto
Scientific and Technical Program Chair
Pierpaolo Degano (Program Chair)
Fabio Martinelli (Demo, Tutorial, Workshop Chair)
Tutorial co-Chair
Mauro Barni
Demo co-Chairs
Gianluca Dini
Pericle Perazzo
Workshop co-Chairs
Alessandro Piva
Tommaso Zoppi
Finance Chair
Paolo Prinetto
Ceremonial Chair
Marco Conti
Website Chair
Fabio Benedetti
Organization Chair
Angela Miola
Registration Chair
Giuseppe Airò Farulla
Secretary Chair
Gabriella Caramagno
Media Chair
Arturo Di Corinto
Advertising/Brand Identity/Communication Chair
Angela Miola
Sponsorship co-Chairs
Gabriella Caramagno
Angela Miola
Vendor Session Chair
Gabriella Caramagno
Innovation - Startup day co-Chairs
Marco Baldi
Giulio Busulini
Gabriele Costa
Luigi Martino
Committees
Scientific and Technical Program CommitteeChair
Pierpaolo Degano (Univ. di Pisa)
Members
Maurizio Aiello (IEIIT-CNR, Genova)
Alessandro Armando (Univ. di Genova)
Antonio Barili (Univ. di Pavia)
Massimo Bartoletti (Univ. di Cagliari)
Giampaolo Bella (Univ. Catania)
Francesco Bergadano (Univ. di Torino)
Stefano Bistarelli (Univ. di Perugia)
Nicola Blefari Melazzi (CNIT, Univ. di Roma Tor Vergata)
Andrea Bondavalli (Univ. di Firenze)
Francesco Buccafurri (Univ. di Reggio Calabria)
Paolo Ciancarini (Univ. di Bologna)
Marco Conti (IIT CNR, Pisa)
Mauro Conti (Univ. di Padova)
Domenico Cotroneo (Univ. di Napoli, Federico II)
Bruno Crispo (Univ. di Trento)
Franco Davoli (CNIT, Univ. di Genova)
Rocco De Nicola (IMT, Lucca)
Camil Demetrescu (Sapienza Univ. di Roma)
Alfredo De Santis (Univ. di Salerno)
Felicita Di Giandomenico (ISTI-CNR, Pisa)
Gianluca Dini (Univ. di Pisa)
Luca Durante (IEIIT, CNR Torino)
Elena Ferrari (Univ. dell'Insubria)
Riccardo Focardi (Univ. Ca'Foscari, Venezia)
Giorgio Giacinto (Univ. di Cagliari)
Franco Guida (Fondazione Ugo Bordoni, Roma)
Antonio Lioy (Politecnico di Torino)
Giuseppe Lo Re (Univ. di Palermo)
Giuseppe Manco (ICAR-CNR, Cosenza)
Fabio Martinelli (IIT-CNR, Pisa)
Isabella Mastroeni (Univ. di Verona)
Marino Miculan (Univ. di Udine)
Francesco Palmieri (Univ. di Salerno)
Stefano Panzieri (Univ. di Roma Tre)
Francesco Parisi-Presicce (Sapienza Univ. di Roma)
Paolo Prinetto (Politecnico di Torino)
Silvio Ranise (Fondazione Bruno Kessler)
Luigi Romano (Univ. di Napoli, Parthenope)
Fabio Rugge (ISPI, Milano)
Domenico Saccà (Univ. della Calabria)
Pierangela Samarati (Univ. di Milano)
Roberto Setola (Univ. Campus Bio-Medico, Roma)
Maurizio Tesconi (IIT-CNR, Pisa)
Corrado Aaron Visaggio (Univ. del Sannio)
Stefano Zanero (Politecnico di Milano)
Roberto Zunino (Univ. di Trento)
Steering CommitteeChair
Paolo Prinetto (Politecnico di Torino)
Members
Alessandro Armando (Univ. di Genova)
Nicola Blefari Melazzi (CNIT & Univ. di Roma Tor Vergata)
Carlo Blundo (Univ. di Salerno)
Andrea Bondavalli (Univ. di Firenze)
Marco Conti (CNR)
Bruno Crispo (Univ. di Trento)
Rocco De Nicola (IMT, Lucca)
Pierpaolo Degano (Univ. di Pisa)
Elena Ferrari (Univ. dell’Insubria)
Riccardo Focardi (Univ. Ca’ Foscari, Venezia)
Antonio Lioy (Politecnico di Torino)
Fabio Martinelli (CNR)
Silvio Migliori (ENEA)
Pierangela Samarati (Univ. di Milano)
Stefano Zanero (Politecnico di Milano)
DemosMembers
Marco Balduzzi (Trend Micro)
Calisto Calisti (IDS Ingegneria dei Sistemi)
Roberto Carbone (Security & Trust Unit, FBK)
Mirko Casadei (Accenture)
Fabio Cocurullo (Leonardo)
Giulia Di Bella (Thales Italia)
Francesco Di Cerbo (SAP)
Emanuele Frontoni (Univ. Politecnica delle Marche)
Luca Guidi (IAMBOO)
Anthony Jeffs (Cisco)
Fabio Lazzini (Sogei)
Giuseppe Lettieri (Univ. di Pisa)
Rocco Mammoliti (Poste Italiane)
Paolo Mori (CNR-IIT)
Gianluigi Pugni (ENEL)
Leonardo Querzoni (Sapienza Univ. di Roma)
Gianluca Varisco (Arduino)
Local Organizing CommitteeChairs
Angela Miola (CINI, Chair)
Adriana Lazzaroni (CNR, Vice-Chair)
Members
Patrizia Andronico (IIT-CNR)
Gabriella Caramagno (CINI)
Raffaella Casarosa (IIT-CNR)
Lina Esposito (CINI)
Eniko Puhl (CINI)
Giulia Severino (IIT-CNR)
Comunicati stampa
Dicono di noi
ITASEC19
Call for Papers
General Information
- Conference Date: 13-15 February, 2019
The ITASEC19 conference solicits two kinds of submissions:
- Original, unpublished contributions that will be included in an open-access post proceeding volume of CEUR Workshop Proceedings, indexed by both Scopus and DBLP;;
- Already published or preliminary work that will not be included in the post proceedings volume.
We particularly encourage submissions on new and emerging topics. Authors are requested to clearly indicate whether their paper should be included in the proceedings volume.
Selected papers may be considered for a special issue or a fast track of either:
- Journal of Logical and Algebraic Methods in Programming
- Pervasive and Mobile Computing
- Computer Communications.
Papers must be in English, formatted in pdf according to the EasyChair style
and no longer than 10 pages, excluding bibliography. Extra material exceeding the
page limit can be included in a clearly marked appendix of at most 5 pages.
Important Dates
- 18 November 2018: Paper submission -- STRICT
- 20 December 2018: Paper notification of acceptance/rejection
- 15 January 2019: Camera ready version of the accepted papers
- 13-15 February 2019: Conference
Paper Submission
- Papers should be submitted to: easychair
- For information please contact: [email protected]
ITASEC19
Call for Workshops
General Information
- Workshop Day: 12 February, 2019
Researchers and practitioners are invited to submit proposals for workshops to be held in conjunction with the ITASEC19 conference. The purpose of workshops is to provide a forum for exchanging opinions, presenting ideas, and discussing preliminary results in an interactive atmosphere.
Proposals should include:
- The workshop name and a short description (150 words) of the workshop, to be posted on the conference web site;
- A brief account of topics, scope and significance of the workshop (if possible include information about past editions);
- Information about the procedure for selecting papers and/or presentations, the dissemination plan, the expected number of participants, and the planned workshop format.
Responsibilities
The ITASEC19 organization provides:
- A link on the ITASEC19 site
- Management of registration for participants
- Setup of meeting space and related equipment
- Coffee breaks and workshop lunch arrangements
- Offer one-day registration to one invited speaker.
The main responsibility of organizing a workshop goes to its chairperson(s); they must:
- Set up and host a webpage
- Coordinate deadlines and notifications with the ITASEC19 co-chairs
- Take care of publicity, call for papers, and submission and review process.
Important Dates
- Workshop proposals due: 21 October 2018
- Workshop notification of acceptance: 25 October 2018
- ITASEC19 workshops: 12 February 2019
Workshop Submission
- Workshop proposals should be submitted as a pdf file to: [email protected]
- For information please contact: [email protected]
ITASEC19
Call for Tutorials
General Information
- Tutorial Day: 12 February, 2019
ITASEC19 seeks applications for full- or half-day tutorials of interest for the cybersecurity community at large. Shorter "embedded tutorials" to be included in the conference program will be considered as well.
Each tutorial proposal should concisely describe the content and objectives of the tutorial, and include:
- Title
- Abstract
- Outline of the tutorial content
- Intended audience, including possible assumed background of attendees
- Name, affiliation, email address, and brief biography of the speaker(s)
- Duration: 1.5 hours (embedded), 3 hours (half-day), 6 hours (full-day).
Important Dates
- Tutorial proposals due: 18 November, 2018
- Tutorial notification of acceptance/rejection: 20 December, 2018
- ITASEC19 Tutorial day: 12 February, 2019
Tutorial Submission
- Tutorial proposals should be submitted as a pdf file to: [email protected]
- For information please contact: [email protected]
ITASEC19
Call for Demos
General Information
- Demos: 13-15 February, 2019
ITASEC19 seeks applications for demonstrations of prototypes or operational systems in any of the areas identified in the scope of the Science &Technology main track. The proposers are expected to prepare a poster and to perform a live demonstration. Demonstrations will provide opportunities to exchange ideas gained from implementing cybersecurity systems and to obtain feedback from expert users.
Demonstration submissions must be in English, formatted in pdf according to the EasyChair style and no longer than 5 pages, excluding
bibliography. They should present the objectives and the findings addressed by the
demonstration; a walk-through of the actual demonstration should be provided in a
clearly marked appendix of at most 5 pages. Commercial demos will not be
considered.
Important Dates
- Demo proposals due: 18 November, 2018
- Demo notification of acceptance/rejection: 20 December, 2018
- ITASEC19 Demos tracks: 12 February, 2019
Submission
- Demo proposals should be submitted: [email protected]
- For information please contact: [email protected]
Program committee
- Marco Balduzzi (Trend Micro)
- Calisto Calisti (IDS Ingegneria dei Sistemi)
- Roberto Carbone (Security & Trust Unit, FBK)
- Mirko Casadei (Accenture)
- Fabio Cocurullo (Leonardo)
- Giulia Di Bella (Thales Italia)
- Francesco Di Cerbo (SAP)
- Emanuele Frontoni (Univ. Politecnica delle Marche)
- Luca Guidi (IAMBOO)
- Anthony Jeffs (Cisco)
- Fabio Lazzini (Sogei)
- Giuseppe Lettieri (Univ. di Pisa)
- Rocco Mammoliti (Poste Italiane)
- Paolo Mori (CNR-IIT)
- Gianluigi Pugni (ENEL)
- Leonardo Querzoni (Sapienza Univ. di Roma)
- Gianluca Varisco (Arduino)
ITASEC19
Call for Start-up
General Information
- Start-up Presentations: 13-15 February, 2019
ITASEC19 will also include special sessions on domestic cybersecurity startups. During these sessions, startups will present their ongoing activities in the field of cybersecurity. Activities include, but are not limited to, emerging technologies, open issues and challenges, innovative products and novel application fields.
Startups can submit their proposals as specified below. Submissions must be in English, formatted in pdf according to the EasyChair style and no longer than 3 pages, excluding bibliography. They must include the following information
- Startup name, description and mission
- Speaker name and short bio
- Abstract
- Description of the presentation
- Intended audience and requirements.
Important Dates
- Start-up proposals due: 13 December 2018
- Start-up notification of acceptance/rejection: 20 December 2018
- ITASEC19 Start-up tracks: 13-15 February, 2019
Submission
- Start-up submissions should be submitted: [email protected]
- For information please contact: [email protected]
Stakeholder space
The Stakeholder Space shall include selected distinguished:
- Keynotes Speeches
- Invited Talks
- Vision Speeches from Platinun Sponsors
- Panels
- Special Sessions, aimed at providing a “stage” for cybersecurity stakeholders
Scientific & Technical Track
The Scientific/Technical Space shall include several kinds of sessions:
- Scientific sessions: aimed at presenting scientific/technical papers;
- Demo sessions: aimed at presenting prototypes developed by industries, research centers, and universities.
Demo Track
Demo - 13 February 2019
- Cybersecurity Language and Education
- Vulnerability Assessment and Analysis
- Low-Level and Physical Attacks
- Defensive and Maintainance Tools
- Quantum Security
Innovation Start-up - Day
Commercializzazione della ricerca, Innovazione, Start ups
Il ruolo del Cini -Laboratorio Nazionale Cyber security come possibile facilitatore della commercializzazione della ricerca e dello sviluppo tecnologico a beneficio della competitività delle aziende nazionali: Dialogo tra stakeholder nell’ ecosistema innovazione in ambito cyber security research.
Principali argomenti- Iniziale mappatura dell’ecosistema nazionale innovazione in ambito cybersecurity research. Overview delle principali iniziative e programmi relative al sostegno del ‘proof of concept’ alla accelerazione impresa
- Primo tentativo di censimento start up/ spin off in ambito cyber da parte del CINI National Cyber security Lab
- Mach making tra aziende ( start up, azienda innovativa, spin off ) verso stakeholder finanziari o corporate Innovation
- La dimensione competitiva del sistema paese in ambito cyber a garanzia della solidità del sistema economico italiano: dalla ricerca alla creazione di impresa.
- Iniziale raccolta di fabbisogni degli Stakeholders da parte Cini -Laboratorio Nazionale Cyber security e ipotesi di lavoro congiunto (mappatura capacità interne, valorizzazione asset, internazionalizzazione, definizione di un piano strategico, elaborazione di un piano operativo,governance delle operazioni)
Chairs:
- Marco Baldi
- Giulio Busulini
- Gabriele Costa
- Luigi Martino
Program (click here)
Per visualizzare il programma complessivo, sezionare
il giorno "14 febbraio" (nel menu in alto), quindi nel menu "Tracks" a destra selezionare
solo "Innovation - Start up day".
Registration (click here)
Tutorial program
Framework 2.0 for Cybersecurity & Data Protection and a Contextualization for GDPR
Chairs:
- Marco Angelini
- Claudio Ciccotelli
- Leonardo Querzoni
Cybersecurity per la Pubblica Amministrazione
Chairs:
- Carlo Blengino
- Andrea Valenza
- Massimo Bartoletti
Recent improvements in biometric spoofing/antispoofing methods and adversarial attacks
Chair:
- Fabio Scotti
Hiding access patterns (obliviousness and differential privacy)
Chairs:
- Carlo Blundo
- Pino Persiano
Building an Emulation Environment for Supporting Security Training and Testing Activities on Complex Networked Systems
Chairs:
- Mara Sorella
- Florin Tanasache
- Silvia Bonomi
Hacking with Metasploit
Chair:
- Federico Lombardi
La "cura" del dato personale nell'azione delle pubbliche amministrazioni
La normativa a protezione dei dati personali costituisce uno dei cardini della sicurezza informatica. La sicurezza e la "cura" del dato equivalgono oggi alla sicurezza ed alla cura delle persone nell'ambiente digitale ed i principi dettati dal GDPR tutelano molteplici diritti fondamentali della persona.
Nella prima parte della sessione esamineremo i principi cardine della normativa a tutela del dato personale, per comprendere non tanto il "come" quanto il "perché" è necessario adottare questo principio di "accountability" che è adesso alla base del "GDPR".
Nella seconda parte affronteremo il tema dei trattamenti nell'ambito delle Pubbliche Autorità. I principi di efficienza e imparzialità, unitamente al principio di trasparenza, impongono da un lato alle Pubbliche Amministrazioni di sfruttare appieno i vantaggi della digitalizzazione, ma nel contempo sono la linfa dell'azione della PA, ma i dati personali non rappresentano utenti, ma persone. La tutela del dato, il suo lecito e corretto trattamento sono la base per un ambiente digitale sicuro e sono il presupposto necessario e indispensabile nell'ambito dei trattamenti delle pubbliche amministrazioni per la corretta attuazione dei diritti fondamentali dei cittadini.
Chair:
- Carlo Blengino
Web Exploitation
Chair:
- Andrea Valenza
Workshop program
DLT 2019: 2nd Distributed Ledger Technology Workshop
This workshop is a forum for researchers, developers, and users to discuss issues related to Distributed Ledger Technology and its adoption in research and business scenarios. The primary goal is to foster discussion and cross-fertilisation of ideas among experts in different fields related to DLTs, and thus advance the national and international state-of-the-art. Research, applications, case studies, and experiences concerning DLT are all encouraged.
Chairs:
- Stefano Bistarelli (Direttore Italian Distributed Ledger Technology Working Group - Università degli Studi Perugia)
- Paolo Mori (Istituto di Informatica e Telematica del CNR)
Program (click here)
Registration (click here)
First Italian Workshop on CTF Competitions (Capture.IT)
The first Italian workshop on CTF competitions (Capture.IT 2019) aims at gathering practitioners and experts that want to share their experience about the organization of and participation to Capture The Flag (CTF) competitions. The purpose of the workshop is to provide a forum for exchanging opinions, presenting ideas, and lesson learned about the CTF. In particular, Capture.IT aims at attracting the CTF community as well as students and young researchers that are active CTF players or organizers. Another goal is to favour the exchange of ideas and experiences in an interactive and informal atmosphere.
Chair:
- Gabriele Costa
Program (click here)
Registration
Quantum Secure Communication
Worldwide communications are growing exponentially. A huge and rapidly growing amount of
information travels every day through optical fibre networks, to which billions of people have
indirect access. From its use in everyday life, such as for making online purchases with credit
cards or for internet banking, to more critical scenarios, such as the transmission of sensitive
data between partner countries under emergency conditions, the need for absolutely secure
communications is unquestioned, all the more so in view of cyber-attacks that are rapidly
increasing in scope and complexity.
Quantum Key Distribution (QKD) promises a leap forward.
It promises nothing less than the ability to achieve unconditional security in communications,
guaranteed by the laws of the universe as opposed to assumptions about available computational
power and the rules of computational complexity. Because of this, QKD is currently considered
the only technology able to guarantee an absolutely secure solution for the key exchange
problem. QKD achieves this by providing a means to distribute an unconditionally-secure key that
is used as a one-time pad. Secure keys distributed by QKD can subsequently be used for various
applications including secure communications and message authentication over any standard
communication channels.
Chair:
- Francesco Saverio Cataliotti
Collaborative Cyber Threat Management and the CNR cybersecurity observatory
Chair:
- Gianpiero Costantino
The European Strategy of ECSO: from innovation to access to the marke
Chair:
- Fabio Martinelli
Comunicare Cybersecurity
Il seminario è specificamente rivolto ai giornalisti, ai blogger, agli studenti che hanno necessità di comprendere i concetti, le idee e la terminologia relativi alle tematiche della sicurezza informatica e della privacy delle comunicazioni. Obiettivo del seminario è favorire l'acquisizione del lessico specialistico e dei concetti relativi alla sfera della Cybersecurity attraverso l’esposizione di fatti di cronaca e delle nozioni informatiche collegate.
Chair:
- Arturo Di Corinto
Influence Operations in the Cyberspace: Linking Prevention, Response and Resilience
The workshop deals with the issue of “cyber-influence operations”, i.e. the illegitimate or
illegal use of information and communication technologies (ICTs) and networked systems to affect
an audience’s choices, ideas, opinions, emotions or motivations, and interfere with decision
making processes. The workshop consists of two integrated discussion panels, each of which
focuses on specific features of “cyber-influence” operations.
The first panel discusses the
political and legal implications that these operations raise at the national and international
level. It will also feature the presentation of a case study on cyber and information warfare
during elections.
The second panel investigates approaches and measures that could be adopted
to counter cyber influence operations via social and other online media at the informational,
technical/technological, policy and other levels.
The workshop further aims at outlining the
actions that governments and other relevant stakeholders could take to prepare, prevent, respond
and recover from threats posed by illegitimate or illegal cyber influence operations or
campaigns.
Chair:
- Matteo E. Bonfanti
Program (click here)
Registration (click here)
Vendor sessions
Vendor Sessions are aimed at providing Sponsors with the opportunity to present in a parallel track, product descriptions, case studies, best practices, and user testimonials. Attendance to the Vendor Sections is open to all symposium attendees.
Program at-a-glance
12 February 2019 - Workshop & Tutorial Day Program (Click here)
13-15 February 2019 – Conference (Click here)
Important Dates
- 21 October 2018Workshop proposals
- 25 October 2018Workshop notification of acceptance
- 18 November 2018Paper submission
- 18 November 2018Tutorial proposals
- 18 November 2018Demo proposals
- 13 December 2018Start-up proposals
- 20 December 2018Paper notification of acceptance
- 20 December 2018Tutorial notification of acceptance
- 20 December 2018Demo notification of acceptance
- 20 December 2018Start-up notification of acceptance
- 21 December 2018Early Registration starts
- 15 January 2019Camera ready version of the accepted Papers
- 15 January 2019Camera ready version of the accepted Demos
- 28 January 2019Late Registration opens
- 31 January 2019Early Registration closes
- 08 February 2019Late Registration closes
- 12 February 2019Workshop & Tutorial Day
- 13-15 February 2019Conference
Venue and Accommodation
Venue
The conference will take place in the Consiglio Nazionale delle Ricerche in via Giuseppe Moruzzi 1, Pisa.
Social Dinner
The Social Dinner will take place in the Arsenali Repubblicani on Feb 14th.
Welcome Reception
The Welcome Reception will take place in the Consiglio Nazionale delle Ricerche in Pisa on Feb 12th.
Directions
From Pisa central railway station:
From Pisa International Airport:
By car
Parking spaces close to the area:
Via di Pratale
Via Paparelli
I praticelli, via Giovanni Berchet
Accommodation
Following you can find a list of the hotels. In order to book the room with these special rates, please contact directly the hotel mentioning your participation in the event ITASEC19 organized at CNR PISA.
| Hotel name | Single | Double | Double single use | Address |
|---|---|---|---|---|
| Blue Shades Aparthotel **** | - | 89 € | 79 € | Via Pasquale Pardi 19, 56121 Pisa PI |
| Hotel Bologna **** | 58 € | 78 € | - | Via Giuseppe Mazzini 57, 56125 Pisa PI |
| Grand Hotel Duomo **** | - | 110 € | 99 € | Via Santa Maria 94, 56126 Pisa PI |
| NH Hotel **** | 90 € | 90 € | 90 € | Piazza della Stazione 2, 56125 Pisa PI |
| Repubblica Marinara **** | - | 94 € | 76 € | Via Carlo Matteucci, 81, 56124 Pisa PI |
| Hotel San Ranieri **** | - | 110 € | 95 € | Via Filippo Mazzei, 2 - 56124 Pisa PI |
| B&B hotel *** | - | 62 € | 52 € | Via Scornigiana, 1, 56121 Pisa PI |
| Royal Victoria *** | - | - | 55 € | Lungarno Pacinotti, 12, 56126 Pisa PI |
Demos
Startups
Sponsorship
Three levels of sponsorships are possible for ITASEC19, characterized by different exposures and recognition: Platinum, Gold, and Silver, respectively.
Please download our sponsorship package for details about the available sponsorship plans. Should you have any question, please contact us by email at: [email protected]





































