Subject: | [WI] CfP: CEAS 2011, Antispam & Security Conference, Sept 2011, Perth, Australia, ERA-B |
---|---|
Date: | Fri, 11 Mar 2011 14:25:18 +1100 |
From: | Christopher Lueg <cplueg@gmail.com> |
To: | wi@aifb.uni-karlsruhe.de |
Call
for Papers
8th Annual
Collaboration, Electronic
Messaging, Anti-Abuse and
Spam Conference (CEAS
2011)
Perth,
Western Australia, 1-2 Sept,
2011
http://ceas2011.debii.edu.au/
Proudly Hosted by the Anti
Spam Research Lab
in the Digital
Ecosystems &
Business Intelligence
Institute, Curtin University
Topics of Interests |
|
Track: Email Spam - Prevention & Detection Techniques - Scalability, reliability, archiving, and retrieval - Early Detection Techniques - Behaviour based Techniques |
Track: Network Security - Message filtering, organization, and security - Network layer protocols for anti spam - Network traffic monitoring for spam prevention - IP & MPLS security, Anti-DDoS techniques - Sand box, malware/botnet detection - Risk assessment, Vulnerability detection - Deep packet inspection, IPv6 security
|
Track: Web Spam & Spam 2.0 - Adversarial learning using machine learning and NLP - Behaviour based techniques for spambot detection - Web spambot characterization - Botnet Detection & Elimination |
Track: Information Technology Security - Anti-Virus & Anti-Worm Techniques - Trojan horse & Data loss protection - Web Applications Security - IM & Email Security - Cloud computing security
|
Track: Spam & Security in Social Networks - Social networking security, privacy, and fraud prevention - Collaborative filtering of user-generated content - Protocols & standards for social networking, collaboration - Crowdsourcing analysis, applications, and theory - Novel uses of wikis and blogs in science, problem solving, - Studies on the use of citizen science and human-based computing - Novel modes of distributed collaboration - User trust and reputation - Terrorist network identification |
Track: Security Technologies - Information hiding and watermarking - Security processor / chip - Encryption and Decryption algorithm - Mobile device security - Code analysis - Trusted computing - Software security - Black box & White box testing - Penetration testing - Model driven security
|
Track: Cyber Crime - Collaboration in adversarial environments - Studies of abuse tactics and patterns - Standards for abuse reporting and monitoring - User identity issues that relate to the conference topics - Phishing Attacks, Real Case Studies on Phishing - Links between Scam, Fraud and Spam - Case studies on scam & fraud , Cyber Forensics
|
Track: Security Management - Information Security Management System - Security Operation Center - System security architecture - Framework and standards - Disaster recovery - IT control and audit |
Track: Spam Economics - Modeling & analysis of economics of abuse, phishing, spam, & fraud - Studies on Cost Benefit Analysis of Spam - Money Laundering - Underground Spam Economy |
|
Abstract Deadline |
5th April 2011 |
Submission Deadline |
15th April 2011 |
Author Notification |
15th June 2011 |
Final Accepted Papers Due |
15th Aug 2011 |
Conference Dates |
1st & 2nd Sept 2011 |
********CEAS 2011 is a ERA-B Conference********
Warm Regards
Conference
General Chair
Vidyasagar M. Potdar