posted by organizer: bwardman || 9223 views || tracked by 20 users: [display]

eCrime 2018 : 13th Symposium on Electronic Crime Research

FacebookTwitterLinkedInGoogle

Link: http://apwg.org/apwg-events/
 
When May 15, 2018 - May 17, 2018
Where San Diego, CA
Submission Deadline Mar 2, 2018
Notification Due Mar 19, 2018
Final Version Due May 1, 2018
Categories    security   information security   cyber security   information technology
 

Call For Papers

The thirteenth Symposium on Electronic Crime Research (eCrime) 2018 will be held between May 14th - 16th 2018 in San Diego, CA.

eCrime 2018 consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.

This conference has two publication tracks to help attract research covering applied, industrial cybercrime research as well as applied and/or theoretical cybercrime academic research. To further strengthen the confidence in each track, there have been two managing chairs and committees appointed for reviewing and selecting papers for each track of the cybercrime conference.

The conference offers travel grants to students who are having issues finding the funding to attend the conference. Note that there is a set final date for requesting the stipend so please get your requests in as soon as possible after hearing back about your paper’s acceptance. eCrime 2018 also has a best paper and runner-up award that is accompanied by a cash reward for the top papers submitted to the academic track only.

Important Dates: (11:59pm US EDT)
Full Papers registration and submission due: March 2nd, 2018
Paper Notifications due: March 19th, 2018
Request for a stipend: April 6th, 2018
Camera ready due: May 1st, 2018
Conference: May 14th-16th, 2018

Academic Track
Topics of interests include (but are not limited to):

Economics of online crime
- Measurement studies of underground economies
- Models of e-crime
- Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
- Uncovering and disrupting online criminal collaboration and gangs
Security-related risk assessments
- The risks and yields of attacks
- Effectiveness of countermeasures
- Metrics standards
- Conventions in the establishment of tests of efficacy
Attack delivery strategies and countermeasures
- Spam
- DNS
- Mobile Apps
- Social engineering
- Instant messaging
- Web browser search manipulation
Crypto Currency Cybercrime Tools and Responses
- Hardware devices to protect encryption keys
- Protections for multisig wallets, failures, new ideas
- Management and protection of cold storage wallets
- Anti-Phishing protections for crypto currencies
- Out of band authentication for transactions
- Multi-party authentication concepts
Malware
- Detection
- Identification of malware families
- Polymorphic malware detection
- Mobile malware
- Ransomware
- Techniques to circumvent detection and sandboxes
Security assessments of the mobile devices
- Mobile App stores and ecosystems
- Mobile App privacy
- Risk prevention issues
Financial infrastructure of e-crime
- Criminal payment processing options
- Money laundering strategies
- Use of crypto-currencies
- Underground marketplaces
Technical, legal, political, social and psychological aspects of fraud and fraud prevention



Industrial Track
Topics of interests include (but are not limited to):

Case studies of current attack methods
- System and network intrusions
- Phishing
- Malware (rogue antivirus, botnets, ransomware, etc…)
- Spam
- Pharming
- Crimeware toolkits
- Emerging threats to mobile devices
Open source intelligence
- Data collection and correlation
- Strategies and tools
Case studies of online advertising fraud
- Click fraud
- Malvertising
- Cookie stuffing
- Affiliate fraud
Case studies of large-scale take-downs
- Coordinated botnet disruption
- Phishing takedown
- Bullet proof hosting services
Economics of online crime
- Measurement studies of underground economies
- Models of e-crime
- Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
Crypto Currency Cybercrime Tools and Responses
- Hardware devices to protect encryption keys
- Protections for multisig wallets, failures, new ideas
- Management and protection of cold storage wallets
- Anti-Phishing protections for crypto currencies
- Out of band authentication for transactions
- Multi-party authentication concepts
Uncovering and disrupting online criminal collaboration and gangs
Longitudinal study of eCrime related activities and their evolutions
Security assessments of the mobile devices
- Mobile App stores and ecosystems
- Mobile malware
- Mobile App privacy
Risk prevention issues
- Security-related risk assessments
- The risks and yields of attacks
- Effectiveness of countermeasures
- Metrics standards
- Conventions in the establishment of tests of efficacy

Related Resources

IPDPS 2018   32nd IEEE International Parallel and Distributed Processing Symposium
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
IEEE AVSS 2018   IEEE International Conference on Advanced Video and Signal-based Surveillance
ACII 2018   Advanced Computational Intelligence: An International Journal
WI 2018   2018 IEEE/WIC/ACM International Conference on Web Intelligence
ICITA 2018   International Conference on Information Technology and Applications
JMIER 2019   Rapid Publication & Free - Journal of Mechanical and Industrial Engineering Research
IEEE--ICCSSE--Ei & Scopus 2018   2018 The 4th International Conference on Control Science and Systems Engineering (ICCSSE 2018)--IEEE, Ei & Scopus
CSIT 2018   5th International Conference on Computer Science and Information Technology (CSIT 2018)
MODELS 2018   ACM/IEEE 21th International Conference on Model Driven Engineering Languages and Systems