ECTCM 2013 - First International Workshop on Emerging Cyberthreats and Countermeasures
Topics/Call fo Papers
The First International Workshop on Emerging Cyberthreats and Countermeasures (co-located with the International Conference on Availability, Reliability and Security, ARES 2013) aims at bringing together researchers and practitioners working in different areas related to cybersecurity. After organizing three informal workshops on Early Warning Systems in IT in the past three years, we strongly believe that the next step is to give the workshop a more formal structure in context of an internationally acclaimed scientific conference. The focus of this year's workshop is on IT Early Warning, Malware Detection and Analysis, Targeted Attacks, Cryptanalysis, and Privacy Protection. Contributions demonstrating both current weaknesses and threats as well as new countermeasures are welcome.
Topics include, but are not limited to:
IT Early Warning
Cooperative Aspects of IT Early Warning
Intrusion Detection and Prevention
Anomaly Detection
IDS Event Correlation
Malware Detection and Analysis
Botnets Detection, Analysis and Mitigation
Targeted Attacks
Novel Attacks against Computers and Networks
Underground Economy
Honeypots and Honeynets
Cyberwarfare, Cyberespionage
Network Security
Wireless Security
Mobile Device Security
Practical Cryptanalysis
Analysis of Cryptographic Protocols
Protection of Critical IT Infrastructures
Anonymity
Privacy and Privacy Preserving Techniques
Legal and social Issues
Topics include, but are not limited to:
IT Early Warning
Cooperative Aspects of IT Early Warning
Intrusion Detection and Prevention
Anomaly Detection
IDS Event Correlation
Malware Detection and Analysis
Botnets Detection, Analysis and Mitigation
Targeted Attacks
Novel Attacks against Computers and Networks
Underground Economy
Honeypots and Honeynets
Cyberwarfare, Cyberespionage
Network Security
Wireless Security
Mobile Device Security
Practical Cryptanalysis
Analysis of Cryptographic Protocols
Protection of Critical IT Infrastructures
Anonymity
Privacy and Privacy Preserving Techniques
Legal and social Issues
Other CFPs
Last modified: 2013-02-16 14:58:48