posted by user: jfl || 2821 views || tracked by 10 users: [display]

MALCON 2016 : 11th IEEE International Conference on Malicious and Unwanted Software

FacebookTwitterLinkedInGoogle

Link: http://www.malwareconference.org/
 
When Oct 11, 2016 - Oct 14, 2016
Where Fajardo, Puerto Rico
Submission Deadline Jul 7, 2016
Notification Due Sep 1, 2016
Final Version Due Sep 8, 2016
Categories    security
 

Call For Papers

Theme: "Emerging Security Architectures & Solutions beyond 2020"

In keeping with its tradition to bring attention to emerging trends and issues in computer security, MALCON 2016 invites academic research and industry experience papers on the following major themes:

• Security architectures & reformulated solutions: Security of an enterprise can no longer be crafted by considering each security device in isolation. New security architectures are needed that view enterprise security as a composition of the capabilities of individual security products, services, and policies
• Protecting end-points in the cloud: With BYOD, SaaS, and cloud storage, the security zone of on organization is no longer constrained within a well-defined security perimeter. New challenges have emerged for protecting the integrity of an organization’s applications, data, and even user accounts.

In addition to the above themes submissions are solicited in, but not limited to, the following areas as well:

• Combating Broad Spectrum Malware amidst changing reality of network walls and end-point trusted zones.
• Evolving nature of cyberattacks, including advanced targeted attacks, ransomware, crypto lockers, phishing, etc.
• Malware and its impact in social networking and cloud computing.
• Enterprise security in the presence of BYOD devices and smartphone malware.
• Analysis and measurements of real malware incidents, and security architectures.
• Botnet attacks, detection/tracking and defense.
• Malware economics and black market studies.
• Code reverse engineering tools and practices.
• Malware performance, analysis and capture tools
• Legal aspects of cyber security, including risk and compliance issues impacting executive decisions.

Publication

Proceedings will be published in printed and DVD form and will be included in the IEEE Xplore digital library.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

Contacts

General Program Chair:
Dr. Fernando C. Colon Osorio, fcco@brandeis.edu
Brandeis University
Technical Program Committee Chair (Research Track):
Prof. Arun Lakhotia, arun@louisiana.edu
University of Louisiana at Lafayette
Technical Program Committe Chair (Industry Tack):
Dr. Anthony Arrott, aarrott@checkvir.com
CheckVir, USA

Related Resources

ASE 2017   The 32nd IEEE/ACM International Conference on Automated Software Engineering
ACISP 2017   Australasian Conference on Information Security and Privacy
DSAA 2017   The 4th IEEE International Conference on Data Science and Advanced Analytics 2017
ICMWT 2017   4th iCatse Conference on Mobile and Wireless Technology
CSEE&T 2017   30th IEEE Conference on Software Engineering Education and Training
USENIX Security 2017   USENIX Security '17
ICDM 2017   IEEE International Conference on Data Mining 2017
AEIJ 2017   Advanced Energy: An International Journal
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
SPLASH 2017   ACM SIGPLAN conference on Systems, Programming, Languages and Applications: Software for Humanity