posted by user: xgeorgio || 7611 views || tracked by 8 users: [display]

MALWARE 2011 : 6th International Conference on Malicious and Unwanted Software

FacebookTwitterLinkedInGoogle

Link: http://www.malware2011.org
 
When Oct 18, 2011 - Oct 19, 2011
Where Fajardo, USA
Submission Deadline Aug 15, 2011
Notification Due Sep 3, 2011
Final Version Due Sep 17, 2011
Categories    software   security
 

Call For Papers

The 6th International Conference on Malicious and Unwanted Software (Malware 2011) to be held at Waldorf Astoria El Conquistador Resort, Fajardo, Puerto Rico, USA. The conference is designed to bring together experts from industry, academia, and government to present and discuss, in an open environment, the latest advances and discoveries in the field of malicious and unwanted software. Techniques, economics and legal issues surrounding the topic of Malware, and the methods to detect and control them will be discussed.

On February 15, 2010 Associated Press reported that the number of cell phones in the world reached a new peak of 4.6 billion devices. In the US, 28% of all devices are Smartphone, whose penetration is increasing at a rate of 55.4% according to an IDC report. It is indisputable that the new platform for computation & communication is the Smartphone. At the same time, all of these devices require backend Data Base intensive application, and hence, Cloud Computing has become the de-facto paradigm for communication and computing in the 21st Century. The implications to the Security Industry are dramatic. The old paradigm of securing the network is quickly being replaced by the new paradigm of “Securing the Cloud”. At the same time, the archaic idea of a single attacker, or a single infection vector is quickly being replace by that of distributed attacks launched from botnets. Imagine a world where 4.6 Billion devices are part of a malicious botnet, how do we protect the cloud?, how do we protect the devices?

The implications of this new paradigm for researchers and practitioners in the Anti-Malware industry are dramatic. Securing the perimeter, and providing a controlled software environment are no longer a choice. How can you secure a perimeter when there is none? How can you secure the computing platform when the device, a Smarphone, is owned by the consumer, managed by the consumer, and monitored by the consumer. This year’s conference will pay particular attention to (and will also be extensively discussed in the panel sessions) the challenges of “Malware and Cloud Computing” from both the attackers and the defender's point of view. Authors are encouraged to submit manuscripts that deal with these crucial topics for the 21st Century..

Secondly, the development of the Smart Grid has become a major global priority that promises lower costs, environmental benefits, and societal benefits. However, in a drive for deployment, as it is often the case with new technologies, the issues of security and protection have often been ignored.

Thirdly, organized criminal networks continue to deploy botnets at a rapid pace. As in previous conference, manuscripts that analyze and identify mechanisms to take down such botnets are of high interest to our attendees. Thus, the organizers of Malware 2011 solicit original written contributions addressing these issues and research questions. Manuscripts focusing on the security properties of Cloud Computing, the risks associated with the deployment of such networks, and the analysis of real incidents where a breach has occurred will be particularly welcomed.

Related Resources

ACM ICSCA 2027   ACM--2027 16th International Conference on Software and Computer Applications (ICSCA 2027)
CIOS 2026   4th International Conference on Cloud, IoT and Security
ICSCA 2027   ACM--2027 16th International Conference on Software and Computer Applications (ICSCA 2027)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
APCT 2027   2027 6th Asia-Pacific Computer Technologies Conference (APCT 2027)
CLBD 2026   7th International Conference on Cloud and Big Data
ICBDC--Ei 2026   2026 11th International Conference on Big Data and Computing (ICBDC 2026)
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
IEEE CCAI 2026   IEEE--2026 6th International Conference on Computer Communication and Artificial Intelligence (CCAI 2026)
IEEE ICCMS 2026   IEEE--2026 The 18th International Conference on Computer Modeling and Simulation (ICCMS 2026)