ECTCM
2015

Third International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2015, International Conference on Availability, Reliability and Security,
August 24-28, 2015, Toulouse, France

Important Dates

Submission: March 31, 2015
April 12, 2015
Author Notification: May 24, 2015
Author Registration: June 1, 2015
June 8, 2015
Proceedings Version: June 8, 2015
June 15, 2015
Workshop/Conference: Aug 24-28, 2015

Previous Workshops

ECTCM 2014

ECTCM 2013

Third International Workshop on
Emerging Cyberthreats and Countermeasures

Co-located with  ARES 2015, International Conference on Availability, Reliability and Security,
August 24-28, 2014, Toulouse, France
http://www.ectcm.net

Call for Papers

PDF | TXT

The Third International Workshop on Emerging Cyberthreats and Countermeasures (co-located with the International Conference on Availability, Reliability and Security, ARES 2015) aims at bringing together researchers and practitioners working in different areas related to cybersecurity. In the elapsed year 2014 bleeding hearts, shocked shells, poodles and several more shocking vulnerabilities in essential parts of our IT (security) infrastructure emerged. We want to contribute to all technical, organizational and social facets of this problem. Contributions demonstrating current vulnerabilities and threats as well as new countermeasures are warmly welcome.

Topics

Topics of interest include, but are not limited to:

Cyberthreats

  • Novel Attacks against Computers and Networks
  • Targeted Attacks
  • Malware Detection and Analysis
  • Mobile Malware
  • Botnet Detection, Analysis and Mitigation
  • Underground Economy
  • Cyberwarfare, Cyberespionage

Countermeasures:

  • Vulnerability Management
  • Network Security
  • Mobile Device Security
  • Intrusion Detection and Prevention
  • Anomaly Detection
  • Honeypots and Honeynets
  • IT Early Warning
  • Practical Cryptanalysis
  • Anonymity
  • Privacy and Privacy Preserving Techniques
  • Privacy and Security in Cloud Environments
  • Censorship and Censorship Resistance
  • Protection of Critical IT Infrastructures
  • Information Security Risk Management
Important dates
Submission Deadline:March 31st, 2015
April 12th, 2015
Author Notification:May 24, 2015
Author Registration:June 1, 2015
Proceedings Version:June 8, 2015
Conference / Workshop:August 24-28, 2015
Submission guidelines

Authors are invited to submit papers in Conference Publishing Services (CPS) Proceedings Manuscripts style (two columns, single-spaced, including figures and references, using 10 pt fonts, and number each page). Please consult the  CPS Author Guidelines for more information!

We solicit the submission of research and application papers (8 pages) representing original, previously unpublished work. We also explicitly encourage submission of work in progress (currently not finished and/or evaluated) to get feedback and discussions on new research ideas. Submitted papers will be evaluated based on originality, significance, technical soundness, and clarity of exposition.

Simultaneous submission of the same work to multiple venues, submission of previously published work, or plagiarism constitutes dishonesty or fraud. ARES and associated workshops, like other scientific and technical conferences and journals, prohibits these practices and may take action against authors who have committed them. To avoid accepting papers which are not presenting original work your paper will be plagiarism checked by  PlagScan Plagarism Check. If you don’t want your paper to be checked automatically please contact us at chair[at]ectcm[dot]net.

Contact author must provide the following information: Paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords. Paper registration and submission is done through the  ARES Paper Management System.

Submission of a paper implies that should the paper be accepted, at least one of the authors will register for the ARES conference and present the paper in the workshop. Guidelines in preparing and submitting the final manuscript(s) will be given after the notification of acceptance.

This workshop requires anonymized submissions (double blind review), so please make sure that submitted papers contain neither author names nor affiliations. Papers should avoid revealing their authors identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else.

Publication

All accepted papers of ARES 2014 and associated workshops were published as ISBN proceedings published by  Conference Publishing Services (CPS)

Organizing committee

Markus Zeilinger, University of Applied Sciences Upper Austria
Eckehard Hermann, University of Applied Sciences Upper Austria
Dieter Vymazal, University of Applied Sciences Upper Austria

Enquiries to the organizing committee may be sent to chair[at]ectcm[dot]net.

Program committee

Christoph Busch, Hochschule Darmstadt, Germany
Jürgen Eckel, IKARUS Security Software, Austria
Gerhard Eschelbeck, Google, USA
Steven Furnell, University of Plymouth, UK
Jürgen Fuss, University of Applied Sciences Upper Austria, Austria
Harald Lampesberger, Johannes Kepler University Linz, Austria
Fabian Yamaguchi, Göttingen University, Germany
Joshua Schiffman, Advanced Micro Devices, USA
Peter Schoo, Huawei, Germany
Edgar Weippl, SBA, Austria
Stefano Zanero, Politecnico di Milano, Italy

more to come!