![]() |
| |||||||||||||||
ECTCM 2015 : Third International Workshop on Emerging Cyberthreats and Countermeasures | |||||||||||||||
Link: http://www.ectcm.net | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Submission deadline extension to April 12, 2015!
Third International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2015) http://www.ectcm.net Co-located with ARES 2015 August 24-28, 2015 Université Paul Sabatier, Toulouse, France http://www.ares-conference.eu/conf/ Call for Papers The Third International Workshop on Emerging Cyberthreats and Countermeasures (co-located with the International Conference on Availability, Reliability and Security, ARES 2015) aims at bringing together researchers and practitioners working in different areas related to cybersecurity. In the elapsed year 2014 bleeding hearts, shocked shells, poodles and several more terrifying vulnerabilities in essential parts of our IT (security) infrastructure emerged. We want to contribute to all technical, organizational and social facets of this problem. Contributions demonstrating current vulnerabilities and threats as well as new countermeasures are warmly welcome. Topics ====== Topics of interest include, but are not limited to: Cyberthreats: - Novel Attacks against Computers and Networks - Targeted Attacks - Malware Detection and Analysis - Mobile Malware - Botnet Detection, Analysis and Mitigation - Underground Economy - Cyberwarfare, Cyberespionage Countermeasures: - Vulnerability Management - Network Security - Mobile Device Security - Intrusion Detection and Prevention - Anomaly Detection - Honeypots and Honeynets - IT Early Warning - Practical Cryptanalysis - Anonymity - Privacy and Privacy Preserving Techniques - Privacy and Security in Cloud Environments - Censorship and Censorship Resistance - Protection of Critical IT Infrastructures - Information Security Risk Management Important dates =============== - Submission Deadline: !! April 12, 2015 !! - Author Notification: May 24, 2015 - Author Registration: !! June 8, 2015 !! - Proceedings Version: !! June 15, 2015 !! - Conference / Workshop: August 24-28, 2015 Submission Guidelines ===================== Authors are invited to submit papers in Conference Publishing Services (CPS) Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 pt fonts, and number each page). Please consult the Author Guidelines at the following web page: http://www2.computer.org/portal/web/cscps/formatting We solicit the submission of research and application papers (8 pages) representing original, previously unpublished work. We also explicitly encourage submission of work in progress (currently not finished and/or evaluated) to get feedback and discussions on new research ideas. Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition. Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES and its associated workshops, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. To avoid accepting papers which are not presenting original work your paper will be plagiarism checked by PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us at chair@ectcm.net. Contact author must provide the following information: paper title, authors' name(s), affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Paper registration and submission is done through the ARES Paper Management System at the following address: https://confdriver.ifs.tuwien.ac.at/ares2015/ Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the ARES conference and present the paper in the workshop. Guidelines for preparing and submitting the final manuscript(s) will be given after the notification of acceptance. This workshop requires anonymized submissions (double blind review), so please make sure that submitted papers contain neither author names nor affiliations. Papers should avoid revealing their authors identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Publication =========== All accepted papers of ARES 2014 and associated workshops were published as ISBN proceedings by Conference Publishing Services (CPS): http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6969844 Organizing committee ==================== Markus Zeilinger, University of Applied Sciences Upper Austria Eckehard Hermann, University of Applied Sciences Upper Austria Dieter Vymazal, University of Applied Sciences Upper Austria Enquiries to the organizing committee may be sent to chair@ectcm.net. Program committee ================= - Christoph Busch, Hochschule Darmstadt, Germany - Pavel Celeda, Masaryk University Brno, Czech Republic - Jürgen Eckel, IKARUS Security Software, Austria - Gerhard Eschelbeck, Google, USA - Steven Furnell, University of Plymouth, UK - Jürgen Fuss, University of Applied Sciences Upper Austria, Austria - Harald Lampesberger, Johannes Kepler University Linz, Austria - Martina Lindorfer, TU Vienna, iSecLab, Austria - Joshua Schiffman, Advanced Micro Devices, USA - Peter Schoo, Huawei, Germany - Edgar Weippl, SBA, Austria - Fabian Yamaguchi, Göttingen University, Germany - Stefano Zanero, Politecnico di Milano, Italy |
|