posted by organizer: ectcm2013 || 2018 views || tracked by 2 users: [display]

ECTCM 2014 : Second International Workshop on Emerging Cyberthreats and Countermeasures 2014

FacebookTwitterLinkedInGoogle

Link: http://www.ectcm.net/
 
When Sep 8, 2014 - Sep 12, 2014
Where Fribourg, Switzerland
Submission Deadline Apr 13, 2014
Notification Due May 23, 2014
Final Version Due Jun 16, 2014
Categories    information security   cyberthreats   countermeasures
 

Call For Papers

NEWS! Paper submission deadline is extended to April 13th, 2014!

Second International Workshop on Emerging Cyberthreats
and Countermeasures (ECTCM 2014)
http://www.ectcm.net

Co-located with ARES 2014
September 8-12, 2014
University of Fribourg, Switzerland
http://www.ares-conference.eu/conf/

Call for Papers

The Second International Workshop on Emerging Cyberthreats and Countermeasures
(co-located with the International Conference on Availability, Reliability and
Security, ARES 2014) aims at bringing together researchers and practitioners
working in different areas related to cybersecurity. All unveilings regarding
massive worldwide online surveillance in the past year led to a somewhat changed
cyber world. We want to contribute to the current discussions about all technical
aspects of this problem. Therefore this years' workshop focuses on new Targeted
Attacks, Malware and all aspects of Privacy. Contributions demonstrating current
weaknesses and threats as well as new countermeasures are warmly welcome.

Topics
======
Topics of interest include, but are not limited to:

Cyberthreats:

- Novel Attacks against Computers and Networks
- Targeted Attacks
- Malware Detection and Analysis
- Mobile Malware
- Botnet Detection, Analysis and Mitigation
- Underground Economy
- Cyberwarfare, Cyberespionage

Countermeasures:

- Network Security
- Mobile Device Security
- Intrusion Detection and Prevention
- Anomaly Detection
- Honeypots and Honeynets
- IT Early Warning
- Practical Cryptanalysis
- Anonymity
- Privacy and Privacy Preserving Techniques
- Privacy and Security in Cloud Environments
- Censorship and Censorship Resistance
- Protection of Critical IT Infrastructures
- Information Security Risk Management

Important dates
===============
- Submission Deadline: March 31st, 2014
- Author Notification: May 23rd, 2014
- Author Registration: June 10th, 2014
- Proceedings Version: June 16th, 2014
- Conference / Workshop: September 8th-12th, 2014

Submission Guidelines
=====================
Authors are invited to submit papers in Conference Publishing Services (CPS)
Proceedings Manuscripts style (two columns, single-spaced, including figures
and references, using 10 pt fonts, and number each page). Please consult the
Author Guidelines at the following web page:
http://www2.computer.org/portal/web/cscps/formatting

We solicit the submission of research and application papers (8 pages)
representing original, previously unpublished work. Submitted papers will be
evaluated based on originality, significance, technical soundness, and clarity
of exposition. We also explicitly encourage submission of work in progress
(currently not finished and/or evaluated) to get feedback and discussions on
new research ideas.

Duplicate submissions are not allowed. A submission is considered to be a
duplicate submission if it has been submitted to (or if it has been already
accepted to be published in) other conferences/workshops/journals. Duplicate
submissions thus will be automatically rejected without review.

Contact author must provide the following information: Paper title, authors'
name(s), affiliations, postal address, phone, fax, and e-mail address of the
author(s), about 200-250 word abstract, and about five keywords. Paper
registration and submission is done through the ARES Paper Management System
at the following address: https://confdriver.ifs.tuwien.ac.at/ares2014/

Submission of a paper implies that should the paper be accepted, at least one
of the authors will register for the ARES conference and present the paper in
the workshop. Guidelines for preparing and submitting the final manuscript(s)
will be given after the notification of acceptance.

This workshop requires anonymized submissions, so please make sure that
submitted papers contain neither author names nor affiliations. Papers should
avoid revealing their authors identity in the text. When referring to your
previous work, do so in the third person, as though it were written by someone
else.

Publication
===========
All accepted papers of ARES 2013 and associated workshops were published as
ISBN proceedings published by Conference Publishing Services (CPS):
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6656131

Organizing committee
====================
Markus Zeilinger, University of Applied Sciences Upper Austria
Eckehard Hermann, University of Applied Sciences Upper Austria
Dieter Vymazal, University of Applied Sciences Upper Austria

Enquiries to the organizing committee may be sent to chair@ectcm.net.

Program committee
=================

- Pavel Celeda, Masaryk University Brno, Czech Republic
- Gerhard Eschelbeck, Sophos, UK
- Steven Furnell, University of Plymouth, UK
- Jürgen Fuss, University of Applied Sciences Upper Austria, Austria
- Thorsten Holz, Ruhr-Universität Bochum, Germany
- Harald Lampesberger, Johannes Kepler University Linz, Austria
- Otmar Lendl, CERT.at, Austria
- Martina Lindorfer, TU Vienna, iSecLab, Austria
- Javier Lopez, University of Malaga, Spain
- Rene Mayrhofer, University of Applied Sciences Upper Austria, Austria
- Michael Meier, University of Bonn, Germany
- Yuko Murayama, Iwate Prefectural University, Japan
- Norbert Pohlmann, Westfälische Hochschule, Germany
- Fabian Yamaguchi, Göttingen University, Germany
- Peter Schoo, Huawei, Germany
- Timo Steffens, BSI, Germany
- Edgar Weippl, SBA, Austria
- Stefano Zanero, Politecnico di Milano, Italy

Related Resources

SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
SECRYPT 2025   22nd International Conference on Security and Cryptography
DaSET 2024   The 3rd International Conference On DATA SCIENCE AND EMERGING TECHNOLOGIES
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
ABEM 2025   9th Academy of Business and Emerging Markets (ABEM) conference 2025
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ESCI 2025   7th IEEE International Conference on Emerging Smart Computing and Informatics (ESCI-2025) (Hybrid Mode)
Cubic Journal 2025   Call for Papers: Cubic Issue #10 – Peri-pheral Design: Exploring emerging approaches at the peripheries of design towards resilient futures in a post-Anthropocene world