posted by user: ectcm2013 || 3871 views || tracked by 4 users: [display]

ECTCM 2013 : First International Workshop on Emerging Cyberthreats and Countermeasures

FacebookTwitterLinkedInGoogle

Link: http://www.ectcm.net/
 
When Sep 2, 2013 - Sep 6, 2013
Where Universität Regensburg, Germany
Submission Deadline Apr 10, 2013
Notification Due May 9, 2013
Final Version Due Jun 1, 2013
Categories    information security   attack   MALWARE   early warning
 

Call For Papers

!! SUBMISSION DEADLINE EXTENDED TO APRIL 10TH, 2013 !!

First International Workshop on Emerging Cyberthreats
and Countermeasures (ECTCM 2013)
http://www.ectcm.net

Co-located with ARES 2013
September 2-6, 2013
University Regensburg, Germany
http://www.ares-conference.eu/conf/

Call for Papers

The First International Workshop on Emerging Cyberthreats and Countermeasures
(co-located with the International Conference on Availability, Reliability
and Security, ARES 2013) aims at bringing together researchers and practitioners
working in different areas related to cybersecurity. After organizing three
informal workshops on Early Warning Systems in IT in the past three years, we
strongly believe that the next step is to give the workshop a more formal
structure in context of an internationally acclaimed scientific conference.
The focus of this year's workshop is on IT Early Warning, Malware Detection
and Analysis, Targeted Attacks, Cryptanalysis, and Privacy Protection.
Contributions demonstrating both current weaknesses and threats as well as new
countermeasures are welcome.

Topics
======
Topics of interest include, but are not limited to:

- IT Early Warning
- Cooperative Aspects of IT Early Warning
- Intrusion Detection and Prevention
- Anomaly Detection
- IDS Event Correlation
- Malware Detection and Analysis
- Botnet Detection, Analysis and Mitigation
- Targeted Attacks
- Novel Attacks against Computers and Networks
- Underground Economy
- Honeypots and Honeynets
- Cyberwarfare, Cyberespionage
- Network Security
- Wireless Security
- Mobile Device Security
- Practical Cryptanalysis
- Analysis of Cryptographic Protocols
- Protection of Critical IT Infrastructures
- Anonymity
- Privacy and Privacy Preserving Techniques
- Legal and Social Issues

Important dates
===============
- Submission Deadline: March 30th, 2013
- Author Notification: May 9th, 2013
- Author Registration: May 18th, 2013
- Proceedings Version: June 1st 2013
- Conference / Workshop: September 2nd-6th, 2013

Submission Guidelines
=====================
Authors are invited to submit papers in Conference Publishing Services (CPS)
Proceedings Manuscripts style (two columns, single-spaced, including figures
and references, using 10 pt fonts, and number each page). Please consult the
Author Guidelines at the following web page:
http://www2.computer.org/portal/web/cscps/formatting

We solicit the submission of research and application papers (8 pages)
representing original, previously unpublished work. Submitted papers will be
evaluated based on originality, significance, technical soundness, and clarity
of exposition. We also encourage submission of work in progress (currently not
finished and/or evaluated) to get feedback and discussions on new research
ideas.

Duplicate submissions are not allowed. A submission is considered to be a
duplicate submission if it has been submitted to (or if it has been already
accepted to be published in) other conferences/workshops/journals. Duplicate
submissions thus will be automatically rejected without review.

Contact author must provide the following information: Paper title, authors'
names, affiliations, postal address, phone, fax, and e-mail address of the
author(s), about 200-250 word abstract, and about five keywords.
Paper registration and submission is done through the ARES Paper Management
System at the following address: https://confdriver.ifs.tuwien.ac.at/ares2013

Submission of a paper implies that should the paper be accepted, at least one
of the authors will register for the ARES conference and present the paper in
the workshop. Guidelines in preparing and submitting the final manuscript(s)
will be given after the notification of acceptance.

This workshop requires anonymized submissions, so please make sure that
submitted papers contain neither author names nor affiliations. Papers should
avoid revealing their authors identity in the text. When referring to your
previous work, do so in the third person, as though it were written by someone
else.

Publication
===========
All accepted papers of ARES 2012 and associated workshops were published as ISBN
proceedings published by Conference Publishing Services (CPS):
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6329167

Organizing committee
====================
Markus Zeilinger, University of Applied Sciences Upper Austria
Peter Schoo, Fraunhofer AISEC
Dieter Vymazal, University of Applied Sciences Upper Austria

Enquiries to the organizing committee may be sent to chair@ectcm.net.

Program committee
=================

- Henk Birkholz, TZi Bremen, Germany
- Pavel Celeda, Masaryk University Brno, Czech Republic
- Gerhard Eschelbeck, Sophos, UK
- Simone Fischer-Hübner, Karlstad University, Sweden
- Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
- Steven Furnell, University of Plymouth, UK
- Jürgen Fuss, University of Applied Sciences Upper Austria, Austria
- Rüdiger Grimm, University Koblenz-Landau, Germany
- Eckehard Hermann, University of Applied Sciences Upper Austria, Austria
- Thorsten Holz, Ruhr-Universität Bochum, Germany
- Heiko Kirsch, Cassidian, Germany
- Harald Lampesberger, Johannes Kepler University Linz, Austria
- Otmar Lendl, CERT.at, Austria
- Martina Lindorfer, TU Vienna, iSecLab, Austria
- Michael Meier, University of Bonn, Germany
- Manuel Nedbal, McAfee, US
- Evangelos Ouzounis, ENISA, Greece
- Norbert Pohlmann, Westfälische Hochschule, Germany
- Christian Rechberger, Technical University of Denmark, Lyngby, Denmark
- Timo Steffens, BSI, Germany
- Edgar Weippl, SBA, Austria
- Philipp Winter, Karlstad University, Sweden

Related Resources

DaSET 2024   The 3rd International Conference On DATA SCIENCE AND EMERGING TECHNOLOGIES
IJCIS 2024   International Journal on Cryptography and Information Security
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ABEM 2025   9th Academy of Business and Emerging Markets (ABEM) conference 2025
SECRYPT 2025   22nd International Conference on Security and Cryptography
ESCI 2025   7th IEEE International Conference on Emerging Smart Computing and Informatics (ESCI-2025) (Hybrid Mode)
ACM ICIIT 2025   ACM--2025 10th International Conference on Intelligent Information Technology (ICIIT 2025)--ESCI
Cubic Journal 2025   Call for Papers: Cubic Issue #10 – Peri-pheral Design: Exploring emerging approaches at the peripheries of design towards resilient futures in a post-Anthropocene world
JITST 2024   Journal of Internet Technology and Secured Transactions