|
| |||||||||||||
APWG eCrime 2025 : Call for Posters | |||||||||||||
| Link: http://apwg.org/ecrime2025 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
|
The Chairs of APWG eCrime and directors of APWG are pleased and honored to invite submissions of posters for display at APWG eCrime 2025.
Submission Requirements: Abstract: A concise abstract of 250-300 words detailing the research, methods, findings, and significance of your work. Keywords: A list of 3-5 keywords for easy categorization. Author Information: Names, affiliations, and email addresses for all co-authors. Poster Presentation: Accepted abstracts will be invited to create a poster for display and discussion at the conference. Posters should be visually engaging and present key information clearly and concisely. Aim for a maximum of 1000 words of text, using bullet points and clear visuals like charts and graphs. Submissions should engage the following topics and themes, consonant with he objectives of APWG eCrime 2025: Artificial Intelligence (AI) as criminal co-conspirator and defensive collaborator, such as: -) Malicious AI agents employed to perform enhanced malware polymorphism, agentic spearphishing, reconnaissance, etc. -) Development and maintenance of criminal co-pilots and the future of human-machine teaming, including hybridized human-crimebot cyber gangs. -) Are malicious AI tools lowering the skills barrier to commit more advanced cybercrimes? Adversarial AI (attacks directly against AIs and machine learning systems) as it relates to the furtherance of cybercrime or cyber-physical cybercrime — especially agents employed in security operations Defensive AI Agents deployed as cybersecurity operations managers and (autonomous and semi-autonomous) counter-cybercrime managers Design, deployment and assessment of multi-agent environments (MAEs) for enhancing resilience of infrastructure and systems to cybercrime Design, deployment and assessment of defences related to AI systems themselves (jailbreaks, injections, etc.) Actual, emerging or potential risks from AI systems deployed to animate cybercrimes against people, operational systems, IoT technologies, or physical spaces and objects Abuse of cyber-physical systems and operational technologies and downstream manipulation (extant, emerging or potential) for furtherance of crimes with physical manifestations, including: -) Drone and robot hijacking and weaponization; -) Criminal abuses and weaponization of medical and surgical systems; -) Criminal abuses and weaponization of IoT for domestic and commercial targeting; -) Criminal abuses and weaponization of autonomous vehicles and delivery robots AI and machine-learning system security to mitigate threats posed by advanced cybercriminal algorithms — and to guard against strategically misinforming and abusing them for criminal enterprises New research on policy, regulation, and law as they pertain to cybercrime of all types Topics of general interest for submissions to eCrime 2025 are listed below, under the heading “Solicited Research Topics for APWG eCrime 2025.” Abstract: Please forward an abstract of 250-300 words detailing the research, methods, findings, and significance of your work. Author Information: Names, affiliations, and email addresses for all co-authors. Poster Presentation: Accepted abstracts will be invited to create a poster for display and discussion at the conference. Posters should be visually engaging and present key information clearly and concisely. Objective is presenting a maximum of 1000 words, using bullet points and clear visuals like charts and graphs. Deadline for submission is October 26, 2025 Submissions should be sent to: Sanjnah Anand (sanandak@alumni.cmu.edu) Please note the following, 1. We are not accepting posters from papers that have already been accepted into eCrime 2025. same authors can apply, but the poster must refer to a different research project/paper. 2. At least one author must physically attend the conference to present their poster. 3. We will not be providing printing services at the venue or otherwise, the authors must make their own arrangements. |
|