posted by user: axellec || 2163 views || tracked by 2 users: [display]

EICAR 2014 : 23rd Annual EICAR Conference

FacebookTwitterLinkedInGoogle

Link: http://www.eicar.org/21-0-Call-for-Papers.html
 
When Nov 17, 2014 - Nov 18, 2014
Where Frankfurt
Submission Deadline Jul 13, 2014
Notification Due Aug 15, 2014
Final Version Due Oct 17, 2014
Categories    anti-virus   security   MALWARE   SMART
 

Call For Papers

EICAR 2014 also intends to initiate a more prospective view on the development, testing and certification of AV and other Security products. The conference shall also address the trust and liability in vendors and testers of IT security products and shall address the following questions:
Verifiability of Information Security
Certification of IT Security Solutions
Verifiable trustworthy Internet Services
Trust in cryptographic mechanism and processes
Secure Software Development
Malware and Spyware Detektion
Security aspects of SmartHome, Smart TV, SmartCars and other smart technologies in the home environment
Industry 4.0
Legal aspects of Smart Surveillance
Legal aspects of Software Development and Maintenance
IT Security in the economy:
- Specifics of SW agreements
- Product liability for SW

Related Resources

ASPLOS 2018   23rd International Conference on Architectural Support for Programming Languages and Operating Systems
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DASFAA 2018   23rd International Conference on Database Systems for Advanced Applications
IJE 2017   International Journal of Education (IJE)
IUI 2018   The 23rd ACM International Conference on Intelligent User Interfaces
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ASP-DAC 2018   23rd Asia and South Pacific Design Automation Conference
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
ICSR 2018   17th International Conference on Software Reuse (ICSR 2018) Madrid (Spain), May 21-23rd, 2018
SACMAT 2018   23rd ACM Symposium on Access Control Models and Technologies