posted by user: suenugus || 4401 views || tracked by 4 users: [display]

ECIW 2010 : 9th European Conference on Information Warfare and Security ECIW 2010

FacebookTwitterLinkedInGoogle


Conference Series : European Conference on Information Warfare and Security
 
Link: http://academic-conferences.org/eciw/eciw2010/eciw10-home.htm
 
When Jul 1, 2010 - Jul 2, 2010
Where Thessaloniki, Greece
Abstract Registration Due May 29, 2010
Submission Deadline Jan 5, 2010
Notification Due Dec 17, 2009
Final Version Due Jan 28, 2010
Categories    information warfare   infornation operations   information assurance   security
 

Call For Papers

CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round Table Proposals, non-academic Contributions and Product Demonstrations


The 9th European Conference on Information Warfare and Security (ECIW) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.


The conference committee welcomes contributions on a wide range of topics using a range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods.


Case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited.



Submission details are given below. Topics for submissions may include, but are not limited to:

Human Factors
Cyber-terrorism
Principles of i-Warfare

Physical security
Counter-terrorism security policies, procedures and legislation
Information warfare policy

SMEs - Small-to-medium Size Enterprises Security model
Critical national infrastructure protection
Information warfare theory

Security implications of “virtualised machines and services
e-Health systems as part of a national critical infrastructure
Information warfare techniques

The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
Information security governance and management
Information warfare and security education

Hacking
Biometrics
e-Intelligence/counter-intelligence

Information Assurance
Cryptography
Networked Centric War

Malware
Wireless Treats
Reflector attacks

UCE
Threat Agents
Art of war

Cyber-fraud
Particle swarm data mining
Computers-as-weapons

Risk Management
Virtual Intrusion Detection
Electro-magnetic pulse weapons

Collaborative decision making
National security policy
Information operations

Security policy
Acute situational awareness
Strategic leadership

Firewalls
Aircraft Environment
Influence campaigns

Phishing and spam
Digital forensics
Psychological warfare

Current Anti Virus Technologies
Network anomaly detection models
PSYOP - PSYOPS

Mobile Virus
Corporate defence mechanisms
Perception management

RFID Virus
Security for small to medium enterprises
Infra-structure warfare

SQL Infections
Information, computer and network security
Military Culture Topography

Data Loss
Security of the virtual worlds
Modern conflict

Data Integration
SIMAD what can/should be done to protect against this threat?
Military approaches

ISO 27001
Unidirectional linguistic steganography
Compromise path analysis

Gaussian empirical rule
IT auditing and compliance
Defence steganography

Natural computing
Information Security Architecture
Data and service integration

Random numbers approximation sequence
Artificial immune recognition system security infrastructure
Legal issues concerned with information warfare and e-Crime

Traffic classification
Public Key Infrastructure
Non-traditional enemies

Subliminal Channel
Network Address Translator
Ethical, political and social issues relating to information warfare

Machine Learning Risk
Mathematical-filtering
Association of Religions with Warfare

Context free grammers
SecureMDA
Image-processing




In addition to the main conference, submissions are welcomed to 5 mini tracks: The role of the Enemy in war propaganda, chaired by Marja Vuorinen, University of Helsinki and Changing security environment: From Nation States to Corporation Security – The Question of Terrorism in Cyber Organization Context co-Chaired by Aki-Mauri Huhtinen, Finnish National Defence College, Finland and Kari Laitinen and Cyber Conflicts Chaired by Rain Ottis , Cyber Defence Centre of Excellence, Tallinn, Estonia and Technical Intelligence gathering and Counterfeiting Chaired by Professor Eric Filiol, ESIEA, France and Manage and implement security strategies and issues at enterprise levels Chaired by Dr Pertti Kuokkanen, Defence Command, Finland.



Academic Paper submissions
Papers should address one of the topics listed in this call for papers and can describe a wide range of research including empirical or theoretical studies. In addition, philosophical papers presenting an argument and papers presenting a process that has been developed and is now ready for wider use are welcome. In all cases concepts and underlying principles should be emphasised, with enough background information to orient any reader who is not a specialist in the particular subject area original. The work should not have been published elsewhere and should not be intended to be published elsewhere during the review period. See the submission details given below.


Work in Progress/Posters

Researchers are invited to submit current projects which are either at the proposal stage or are work in progress. In the first instance you should submit an abstract describing the project. If your abstract is selected you will be asked to produce a short positioning paper of no more than 2000 words (including abstract, keywords, references). The paper will be double-blind peer reviewed and if accepted will be published in the conference proceedings. Presentation of the work at the conference will take the form of a Poster. Posters will be on display for the duration of the conference and there will be a timetabled slot for contributors to stand by their posters so that participants can come and discuss the research.


PhD Research

Doctoral Candidates are invited to submit papers describing their research. To be eligible, it is necessary for the paper to be produced to a publishable academic standard and papers will be subject to the same criteria and processes as research papers. However the final results of the research may not have been fully completed and interpreted.


Case Study Submissions

Case study submissions should be written to publishable standards. Case studies will be subject to the same criteria and the processes as research papers.


Non-Academic Contributions

The conference committee welcomes contributions from individuals and organisations working in the field. These contributions can take the form of a presentation or a demonstration. In the first instance an abstract should be submitted describing the work to be presented. If the abstract is selected you will be asked whether you wish to produce a paper, a poster or just give a presentation. You will need to register for the conference to have a confirmed timetabled slot.


Round Table Proposals

The Programme Committee invites topical subjects to be proposed for discussion. In the first instance an abstract describing the proposed topic should be submitted. If selected the convener will be given a timetabled slot for the round table and will be expected to register to attend the conference.


Product Demonstrations and Exhibitor Opportunities

If you are contributing to the conference in any of the above categories you can also request the opportunity to give a product demonstration. If you would like to exhibit and/or demonstrate a product at the conference we suggest that you apply for one of our exhibitor packages.



Submission details

Abstract details:
All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 10 December 2009. Please read the Abstract Guidelines section of the website before submitting.

Submission:
Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author.

Full paper:
Only required after acceptance of abstract and not to be more than 5,000 words including abstract, keywords and references. Submission date will be no later than 28 January 2010. Papers should be submitted as .doc or .rtf file attachments by email to the Conference Manager, Elaine Hayne.




Important information

The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference. The authors of abstracts, which describe a relevant paper, will receive a notification of abstract acceptance. All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced. Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. Therefore if multiple papers are accepted for presentation different co-authors need to present each paper. Author registration must be completed by 27 May 2010.



Conference proceedings Accreditations


The ECIW conference proceedings are:

·listed in the Thomson Reuters ISI Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings)

·listed in the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP)

·listed in the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).

·indexed by the Institution of Engineering and Technology in the UK.


Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration.


Selected papers presented at Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com.


Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).



Proceedings for previous ECIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.



Important dates

Abstract submission deadline:
10 December 2009
Extended until 5 January 2010

Notification of abstract acceptance:
17 December 2009


Full paper due for review:
28 January 2010


Notification of paper (acceptance with any requested changes)
8 April 2010


Earlybird registration closes
22 May 2010


Final paper due (with any changes):
6 May 2010


Author registration final date:
27 May 2010

Related Resources

ECCWS 2024   23rd European Conference on Cyber Warfare and Security
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ECCWS 2025   24th European Conference on Cyber Warfare and Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)