posted by user: bwardman || 10236 views || tracked by 10 users: [display]

IEEE eCrime 2017 : eCrime 2017 - Symposium on Electronic Crime (IEEE)

FacebookTwitterLinkedInGoogle

Link: http://apwg.org/apwg-events/ecrime2017/cfp
 
When Apr 25, 2017 - Apr 27, 2017
Where Scottsdale, AZ
Submission Deadline Feb 8, 2017
Notification Due Mar 3, 2017
Final Version Due Apr 8, 2017
Categories    computer security   computer science   phishing   security
 

Call For Papers

The twelth Symposium on Electronic Crime Research (eCrime) 2017 will be held between April 25 - 27, 2017 in Scottsdale, Arizona.

eCrime 2017 consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.

New to this conference is the introduction of two publication tracks to help attract research covering applied, industrial cybercrime research as well as applied and/or theoretical cybercrime academic research. To further strengthen the confidence in each track, there have been two managing chairs and committees appointed for reviewing and selecting papers for each track of the cybercrime conference.

The conference offers travel grants to students who are having issues finding the funding to attend the conference. Note that there is a set final date for requesting the stipend so please get your requests in as soon as possible after hearing back about your paper’s acceptance. eCrime 2017 also has a best paper and runner-up award that is accompanied by a cash reward for the top papers submitted to the academic track only.

Academic Track
Topics of interests include (but are not limited to):

- Economics of online crime
- Measurement studies of underground economies
- Models of e-crime
- Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
- Uncovering and disrupting online criminal collaboration and gangs
- Security-related risk assessments
- The risks and yields of attacks
- Effectiveness of countermeasures
- Metrics standards
- Conventions in the establishment of tests of efficacy
- Attack delivery strategies and countermeasures
- Spam
- DNS
- Mobile Apps
- Social engineering
- Instant messaging
- Web browser search manipulation
- Malware
- Detection
- Identification of malware families
- Polymorphic malware detection
- Mobile malware
- Techniques to circumvent detection and sandboxes
- Security assessments of the mobile devices
- Mobile App stores and ecosystems
- Mobile App privacy
- Risk prevention issues
- Financial infrastructure of e-crime
- Criminal payment processing options
- Money laundering strategies
- Use of crypto-currencies
- Underground marketplaces
- Technical, legal, political, social and psychological aspects of fraud and fraud prevention

Industrial Track
Topics of interests include (but are not limited to):

- Case studies of current attack methods
- System and network intrusions
- Phishing
- Malware (rogue antivirus, botnets, ransomware, etc…)
- Spam
- Pharming
- Crimeware toolkits
- Emerging threats to mobile devices
- Open source intelligence
- Data collection and correlation
- Strategies and tools
- Case studies of online advertising fraud
- Click fraud
- Malvertising
- Cookie stuffing
- Affiliate fraud
- Case studies of large-scale take-downs
- Coordinated botnet disruption
- Phishing takedown
- Bullet proof hosting services
- Economics of online crime
- Measurement studies of underground economies
- Models of e-crime
- Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
- Uncovering and disrupting online criminal collaboration and gangs
- Longitudinal study of eCrime related activities and their evolutions
- Security assessments of the mobile devices
- Mobile App stores and ecosystems
- Mobile malware
- Mobile App privacy
- Risk prevention issues
- Security-related risk assessments
- The risks and yields of attacks
- Effectiveness of countermeasures
- Metrics standards
- Conventions in the establishment of tests of efficacy

Related Resources

CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE ACIRS 2025   IEEE--2025 10th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE CRC 2025   IEEE--2025 10th International Conference on Control, Robotics and Cybernetics (CRC 2025)
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IEEE ICAIT 2025   2025 IEEE 17th International Conference on Advanced Infocomm Technology (ICAIT 2025)
ICTAI 2025   IEEE 37th International Conference on Tools with Artificial Intelligence