posted by user: waccoworkshop || 1073 views || tracked by 1 users: [display]

WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022

FacebookTwitterLinkedInGoogle

Link: https://wacco-workshop.org
 
When Jun 6, 2022 - Jun 6, 2022
Where Genoa, Italy
Submission Deadline Mar 14, 2022
Notification Due Apr 8, 2022
Final Version Due Apr 20, 2022
Categories    cybercrime   criminology   economics of cybercrime   measurements
 

Call For Papers

WACCO 2022

*** DEADLINE EXTENSION ***


The WACCO 2022 submission deadline has been extended to the 14th of March 2022 (11:59pm AoE).


Fourth Workshop on Attackers and Cyber-Crime Operations

IEEE European Symposium on Security and Privacy 2022

https://wacco-workshop.org/
June 6, 2022 - Genoa, Italy

Important dates:
Paper submissions due: 14/03/2022 AoE
Acceptance Notice to Authors: 08/04/2022
Publication-ready Papers Submitted: 20/04/2022


The emergence and commoditization of cyber-criminal activities calls for new empirical methods, measures, and technologies to quantify and understand offender operations across all forms of cyber-crime: from malware engineering and attack delivery, to running underground operations trading illegal goods such as drugs and illegal pornography, to spreading disinformation and planning (cyber-)terrorism operations. Without appropriate scientific measures of cyber-offender and attacker operations, capabilities, and resources, it remains impossible to derive sound policies, strategies and technologies that appropriately address realistic and evidence-based attacker and offender models.

WACCO 2022 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.



Topics of interest include, but are not limited to:

- Empirical studies on attacker operations and communities
- Novel methods to perform attacker measurements at scale across several communities
- Cooperation and trust as a source of attackers’ effectiveness - Attackers’ skill set
- Attackers’ operational security
- Measuring the spread of false information campaigns on social media
- Quantitative and qualitative methods to measure, track, and counter cybercrime
- Cybercrime measurement and networks
- Cybercrime policy
- Economics of cybercrime
- Profiling of cybercriminals
- Security metric design and evaluation
- Security patch measurement
- Statistical exploration and prediction of security incidents
- Open Source INTelligence (OSINT) and digital footprints


Review model


Open reports: WACCO promotes an open and transparent review process. Reviews of accepted papers will be published together with the papers and archived in a public github repository associated with WACCO. A link to that repository must be included in all accepted submissions. The reasons why WACCO implements an open report model are the following:

- It documents why the paper was considered positively to contribute to the larger scientific domain it pertains to;
- It provides a critique useful to better delineate research limitations and scope, which can be of particular benefit to young researchers and students alike;
- It provides a structural incentive for reviewers to write constructive and clear reviews;
- It provides a structural incentive for authors to implement reviewer recommendations for the camera-ready version of their paper;
- It provides a critical viewpoint for future work and research follow-ups;
- It provides additional transparency to the quality of the adopted review process and its outcomes.



Submission Types


WACCO encourages submission of full papers and position papers from academia, industry, and government. They should present interesting results for both theory and experimentation in the area of attacker and cyber-crime operations. We also particularly welcome independent reproduction of previous studies or experiments or negative results. We expect full papers to be of 10 pages in length (IEEE Format). Longer papers that document extensive experimentation are full in scope (which could be described in annex of the main body of the paper). Position papers of around 4 pages in length should present new open and interesting questions that the community should address or open questions that past research papers have not yet addressed. We expect position papers to be presented in panels or poster-platform sessions.



Anonymous submissions


Papers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected.



Submission of work that has been previously presented at conferences without proceedings, even if that work is associated with the names of the authors, or is published on online repositories such as ArXiv.org or SSRN, is allowed as long as the submission is fully anonymized. PC members that may recognize the work and its authors are asked to declare conflict on that paper and will not be assigned to it.


Publications


All papers will be published by IEEE CS and posted on the IEEE digital libraries. All authors of accepted papers are expected to present their paper at the workshop.



Organizers



Luca Allodi, Eindhoven University of Technology, the Netherlands (l.allodi@tue.nl)

Alice Hutchings, Cambridge University, United Kingdom (alice.hutchings@cl.cam.ac.uk)

Sergio Pastrana, University Carlos III of Madrid, Spain (spastran@inf.uc3m.es)



Programme Committee

See WACCO 2022 website: https://wacco-workshop.org/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IMC 2025   ACM Internet Measurement Conference 2025 (cycle 2)
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ALLSENSORS 2025   The Tenth International Conference on Advances in Sensors, Actuators, Metering and Sensing
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICCPS 2025   16th ACM/IEEE International Conference on Cyber-Physical Systems
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IEEE ACIRS 2025   IEEE--2025 10th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2025)
IEEE AMCAI 2025   IEEE Afro-Mediterranean Conference on Artificial Intelligence