posted by user: jfl || 2608 views || tracked by 8 users: [display]

MALCON 2016 : 11th IEEE International Conference on Malicious and Unwanted Software

FacebookTwitterLinkedInGoogle

Link: http://www.malwareconference.org/
 
When Oct 11, 2016 - Oct 14, 2016
Where Fajardo, Puerto Rico
Submission Deadline Jul 7, 2016
Notification Due Sep 1, 2016
Final Version Due Sep 8, 2016
Categories    security
 

Call For Papers

Theme: "Emerging Security Architectures & Solutions beyond 2020"

In keeping with its tradition to bring attention to emerging trends and issues in computer security, MALCON 2016 invites academic research and industry experience papers on the following major themes:

• Security architectures & reformulated solutions: Security of an enterprise can no longer be crafted by considering each security device in isolation. New security architectures are needed that view enterprise security as a composition of the capabilities of individual security products, services, and policies
• Protecting end-points in the cloud: With BYOD, SaaS, and cloud storage, the security zone of on organization is no longer constrained within a well-defined security perimeter. New challenges have emerged for protecting the integrity of an organization’s applications, data, and even user accounts.

In addition to the above themes submissions are solicited in, but not limited to, the following areas as well:

• Combating Broad Spectrum Malware amidst changing reality of network walls and end-point trusted zones.
• Evolving nature of cyberattacks, including advanced targeted attacks, ransomware, crypto lockers, phishing, etc.
• Malware and its impact in social networking and cloud computing.
• Enterprise security in the presence of BYOD devices and smartphone malware.
• Analysis and measurements of real malware incidents, and security architectures.
• Botnet attacks, detection/tracking and defense.
• Malware economics and black market studies.
• Code reverse engineering tools and practices.
• Malware performance, analysis and capture tools
• Legal aspects of cyber security, including risk and compliance issues impacting executive decisions.

Publication

Proceedings will be published in printed and DVD form and will be included in the IEEE Xplore digital library.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Contacts

General Program Chair:
Dr. Fernando C. Colon Osorio, fcco@brandeis.edu
Brandeis University
Technical Program Committee Chair (Research Track):
Prof. Arun Lakhotia, arun@louisiana.edu
University of Louisiana at Lafayette
Technical Program Committe Chair (Industry Tack):
Dr. Anthony Arrott, aarrott@checkvir.com
CheckVir, USA

Related Resources

ICMWT 2017   4th International Conference on Mobile and Wireless Technology
DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
AEIJ 2016   Advanced Energy: An International Journal
CSEE&T 2017   30th IEEE Conference on Software Engineering Education and Training
ACISP 2017   Australasian Conference on Information Security and Privacy
SOFTWARE-CSV 2017   IEEE Software Special Issue on Contextual Variability Modeling
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
SEKE 2017   The Twenty-Ninth International Conference on Software Engineering and Knowledge Engineering
IJNGN 2016   International Journal of Next-Generation Networks