posted by user: jfl || 4031 views || tracked by 9 users: [display]

MALCON 2016 : 11th IEEE International Conference on Malicious and Unwanted Software

FacebookTwitterLinkedInGoogle

Link: http://www.malwareconference.org/
 
When Oct 11, 2016 - Oct 14, 2016
Where Fajardo, Puerto Rico
Submission Deadline Jul 7, 2016
Notification Due Sep 1, 2016
Final Version Due Sep 8, 2016
Categories    security
 

Call For Papers

Theme: "Emerging Security Architectures & Solutions beyond 2020"

In keeping with its tradition to bring attention to emerging trends and issues in computer security, MALCON 2016 invites academic research and industry experience papers on the following major themes:

• Security architectures & reformulated solutions: Security of an enterprise can no longer be crafted by considering each security device in isolation. New security architectures are needed that view enterprise security as a composition of the capabilities of individual security products, services, and policies
• Protecting end-points in the cloud: With BYOD, SaaS, and cloud storage, the security zone of on organization is no longer constrained within a well-defined security perimeter. New challenges have emerged for protecting the integrity of an organization’s applications, data, and even user accounts.

In addition to the above themes submissions are solicited in, but not limited to, the following areas as well:

• Combating Broad Spectrum Malware amidst changing reality of network walls and end-point trusted zones.
• Evolving nature of cyberattacks, including advanced targeted attacks, ransomware, crypto lockers, phishing, etc.
• Malware and its impact in social networking and cloud computing.
• Enterprise security in the presence of BYOD devices and smartphone malware.
• Analysis and measurements of real malware incidents, and security architectures.
• Botnet attacks, detection/tracking and defense.
• Malware economics and black market studies.
• Code reverse engineering tools and practices.
• Malware performance, analysis and capture tools
• Legal aspects of cyber security, including risk and compliance issues impacting executive decisions.

Publication

Proceedings will be published in printed and DVD form and will be included in the IEEE Xplore digital library.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Contacts

General Program Chair:
Dr. Fernando C. Colon Osorio, fcco@brandeis.edu
Brandeis University
Technical Program Committee Chair (Research Track):
Prof. Arun Lakhotia, arun@louisiana.edu
University of Louisiana at Lafayette
Technical Program Committe Chair (Industry Tack):
Dr. Anthony Arrott, aarrott@checkvir.com
CheckVir, USA

Related Resources

ICAISE--IEEE, EI and Scopus 2018   2018 International Conference on Artificial Intelligence and Software Engineering (ICAISE 2018)--IEEE, EI Compendex and Scopus
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
IEEE SW - 50 Years of SWE 2018   IEEE Software - Theme Issue 50 Years of Software Engineering
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IEEE TETCI 2018   IEEE Transactions on Emerging Topics in Computational Intelligence Special Issue on Computational Intelligence in Data-Driven Optimization
ISSTA 2018   International Symposium on Software Testing and Analysis
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
MalIoT 2017   International Workshop on Malicious Software and Hardware in the Internet of Things
AI 2017   3rd International Conference on Artificial Intelligence and Applications