posted by user: axellec || 4170 views || tracked by 3 users: [display]

EICAR 2012 : 21 th EICAR Annual Conference


When May 7, 2012 - May 8, 2012
Where Lisbon, Portugal
Submission Deadline Dec 16, 2011
Notification Due Feb 17, 2012
Final Version Due Mar 30, 2012
Categories    MALWARE   anti-virus   security

Call For Papers

The conference committee is seeking submissions of papers for oral presentation at the conference in two major categories:
Peer reviewed papers – these papers will be selected on basis of blind peer review by members of the program committee and other independent reviewers (where necessary). Case studies, research in progress and full research papers including theoretical papers will be considered for the inclusion in the conference program. There is no definitive word limit for the submissions; however, it is anticipated that submissions will be between 3500 and 5500 words. The program committee will not accept research proposals for submission to the conference.
Other papers – these papers will not be peer reviewed. However, due to the considerable interest in the conference in the previous years, these papers will also be reviewed and selected for acceptance by the program committee. This category covers corporate papers, best practices, new technologies, policy issues etc and the conference committee are eager to obtain submissions from industry, government and other sectors for this category. However, marketing papers will not be accepted for the conference.
The conference committee can accept only a limited number of papers in each category and the acceptance ratio in the past few years was about 30-40% of submitted papers only. All accepted papers will be published in electronic form on the Conference CD-ROM and will be published in the printed version of the EICAR Conference Proceedings (book with ISBN). The best papers will be published in a special issue of the Journal in Computer Virology, a research journal published by Springer Verlag.
The best Paper will be awarded by the conference committee.
- Is the current industry driven approach to AV still the right one?
- Are governments required to be more proactive?
- Are new tools and/or regulations required?
- Does Law Enforcement need to use malware in an offensive way?
- Do we need “Threat – Levels” and respective continuation plans?
- What is the actual “Threat – Level” for the end user?
- What are the vulnerabilities against threats?
- How can the end user assess his risk?
- How do companies assess their risks?
- How do we manage IT and the associated risks?
In summary, the rapid evolution of technologies requires the adaptation of
human behaviour and in consequence leads to new needs for laws and
regulations of direct relevance to the users, in the perspective of a rapid
evolution of malware and attack techniques.
This call for scientific/technical/ industry papers invites therefore the submission
of full papers and abstracts on one or more topics devoted to malware and antimalware technologies, which may include but are not limited to:
• New trends in malicious codes and their side effects
• New trends in viruses and worms
• New trends in governmental use of malware
• New trend in e-Crime and e-Forensics
• Facts and techniques to evaluate the reality of the threat
• New trends in Cyber Terrorism
• Vulnerability Assessments
• Threat Assessments
• Risk management
• INFOSEC Management
• Identity Management
• ICT Security and Policy Management
• Emerging technologies (WiFi, RFID, biometrics…) with respect to malware.
• Malicious cryptography and steganography

Related Resources

AI-in-th-loop 2022   AI-in-the-loop - Reconfiguring HCI for AI development | HCI International 2022
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
EUVIP 2021   9-th European Workshop on Visual Information Processing
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
SYROCO 2021   13 th IFAC Symposium on Robot Control
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI