-------- Original Message -------- Subject: [WI] CfP: CEAS 2011, Antispam & Security Conference, Sept 2011, Perth, Australia, ERA-B Date: Fri, 11 Mar 2011 14:25:18 +1100 From: Christopher Lueg cplueg@gmail.com To: wi@aifb.uni-karlsruhe.de
============================================================================================
*Call for Papers** **8^th ****Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011) ** *Perth, Western Australia, 1-2 Sept, 2011* *http://ceas2011.debii.edu.au/**
Proudly Hosted by the Anti Spam Research Lab http://asrl.debii.curtin.edu.au/ in the Digital Ecosystems & Business Intelligence Institute http://debii.curtin.edu.au/, Curtin University http://www.curtin.edu.au/
**
*Topics of Interests***
*Track: Email Spam*
- Prevention & Detection Techniques
- Scalability, reliability, archiving, and retrieval
- Early Detection Techniques
- Behaviour based Techniques
*Track: Network Security*
- Message filtering, organization, and security
- Network layer protocols for anti spam
- Network traffic monitoring for spam prevention
- IP & MPLS security, Anti-DDoS techniques
- Sand box, malware/botnet detection
- Risk assessment, Vulnerability detection
- Deep packet inspection, IPv6 security
*Track: Web Spam & Spam 2.0*
- Adversarial learning using machine learning and NLP
- Behaviour based techniques for spambot detection
- Web spambot characterization
- Botnet Detection & Elimination
*Track: Information Technology Security*
- Anti-Virus & Anti-Worm Techniques
- Trojan horse & Data loss protection
- Web Applications Security
- IM & Email Security
- Cloud computing security
*Track: Spam & Security in Social Networks*
- Social networking security, privacy, and fraud prevention
- Collaborative filtering of user-generated content
- Protocols & standards for social networking, collaboration
- Crowdsourcing analysis, applications, and theory
- Novel uses of wikis and blogs in science, problem solving,
- Studies on the use of citizen science and human-based computing
- Novel modes of distributed collaboration
- User trust and reputation
- Terrorist network identification
*Track: Security Technologies*
- Information hiding and watermarking
- Security processor / chip
- Encryption and Decryption algorithm
- Mobile device security
- Code analysis
- Trusted computing
- Software security
- Black box & White box testing
- Penetration testing
- Model driven security
*Track: Cyber Crime*
- Collaboration in adversarial environments
- Studies of abuse tactics and patterns
- Standards for abuse reporting and monitoring
- User identity issues that relate to the conference topics
- Phishing Attacks, Real Case Studies on Phishing
- Links between Scam, Fraud and Spam
- Case studies on scam & fraud , Cyber Forensics
*Track: Security Management*
- Information Security Management System
- Security Operation Center
- System security architecture
- Framework and standards
- Disaster recovery
- IT control and audit
*Track: Spam Economics*
- Modeling & analysis of economics of abuse, phishing, spam, & fraud
- Studies on Cost Benefit Analysis of Spam
- Money Laundering
- Underground Spam Economy
**
**
**
*Important Dates http://ceas2011.debii.edu.au/index.php/important-dates*
Abstract Deadline
5^th April 2011
Submission Deadline
15^th April 2011
Author Notification
15^th June 2011
Final Accepted Papers Due
15^th Aug 2011
Conference Dates
1^st & 2^nd Sept 2011
********CEAS 2011 is a ERA-B Conference********
Warm Regards
Conference General Chair Vidyasagar M. Potdar
CEAS 2011
http://ceas2011.debii.edu.au/**