2010-02-22

Re: [Tccc] CFP IEEE eCrime 2010 Dallas, TX deadline May 30, 2010

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAkuC0zwACgkQE5f5cImnZrs4gwCgq+x2VU9OzQmwjiz97aIqC3lt
43YAn2WT/SmlH7+EGLOTFBM/peegY4Il
=gWjv
-----END PGP SIGNATURE-----
A reminder to those posting to this list, and to those creating CFPs for
their conferences:

The IEEE does NOT permit the use of their name or logos when sponsorship
is "pending".

Such posts, which violate the terms of sponsorship with the IEEE, SHOULD
NOT be posted to this list. It's OK to post without the IEEE name/logo,
AND without referring to any pending sponsorship.

Please review this with the IEEE if you have any questions.

Joe (TCCC chair)

Saeed Abu Nimeh wrote:
> CALL FOR PAPERS
>
> IEEE eCrime Researchers Summit 2010
> (Pending IEEE sponsorship)
> http://ecrimeresearch.org
>
> The fifth IEEE eCrime Researchers Summit 2010 once again will be held in
> conjunction with the 2010 APWG General Meeting between October 18-20,
> 2010 in Dallas, TX.
>
> eCRS 2010 will bring together academic researchers, security
> practitioners, and law enforcement to discuss all aspects of electronic
> crime and ways to combat it, Topics of interests include (but are not
> limited to):
>
> * Phishing, rogue-AV, pharming, click-fraud, crimeware, extortion and
> emerging attacks.
> * Technical, legal, political, social and psychological aspects of
> fraud and fraud prevention.
> * Malware, botnets, ecriminal/phishing gangs and collaboration, or
> money laundering.
> * Techniques to assess the risks and yields of attacks and the success
> rates of countermeasures.
> * Delivery techniques, including spam, voice mail and rank
> manipulation; and countermeasures.
> * Spoofing of different types, and applications to fraud.
> * Techniques to avoid detection, tracking and takedown; and ways to
> block such techniques.
> * Honeypot design, data mining, and forensic aspects of fraud prevention.
> * Design and evaluation of user interfaces in the context of fraud and
> network security.
> * Best practices related to digital forensics tools and techniques,
> investigative procedures, and evidence acquisition, handling and
> preservation.
>
>
> Important dates: (11:59pm US EDT)
> Full paper submissions due: May 30, 2010
> RIP paper submissions due: June 13, 2010
> Paper notifications: Aug 1, 2010
> Poster submissions due: August 29, 2010
> Poster notifications: September 5, 2010
> Conference: October 18-20, 2010
> Camera ready due: October 27, 2010
>
> For more information on the submission process, visit
> http://www.ecrimeresearch.org/2010/cfp.html
> _______________________________________________
> Tccc mailing list
> Tccc@lists.cs.columbia.edu
> https://lists.cs.columbia.edu/cucslists/listinfo/tccc

1 comment:

sam59527 said...

sangambayard-c-m.com