Honeypots
Call for Papers: CEAS 2011, Antispam & Security Conference, Sept 2011, Perth, Australia, ERA-B Mar 10 2011 06:19AM
ceas2011 gmail com
Call for Papers

8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011)

Perth, Western Australia, 1-2 Sept, 2011

http://ceas2011.debii.edu.au/

Proudly Hosted by the Anti Spam Research Lab in the Digital Ecosystems & Business Intelligence Institute, Curtin University

http://asrl.debii.curtin.edu.au

========================================================================
==

Topics of Interests

========================================================================
==

Track: Email Spam

- Prevention & Detection Techniques

- Scalability, reliability, archiving, and retrieval

- Early Detection Techniques

- Behaviour based Techniques

Track: Network Security

- Message filtering, organization, and security

- Network layer protocols for anti spam

- Network traffic monitoring for spam prevention

- IP & MPLS security, Anti-DDoS techniques

- Sand box, malware/botnet detection

- Risk assessment, Vulnerability detection

- Deep packet inspection, IPv6 security

Track: Web Spam & Spam 2.0

- Adversarial learning using machine learning and NLP

- Behaviour based techniques for spambot detection

- Web spambot characterization

- Botnet Detection & Elimination

Track: Information Technology Security

- Anti-Virus & Anti-Worm Techniques

- Trojan horse & Data loss protection

- Web Applications Security

- IM & Email Security

- Cloud computing security

Track: Spam & Security in Social Networks

- Social networking security, privacy, and fraud prevention

- Collaborative filtering of user-generated content

- Protocols & standards for social networking, collaboration

- Crowdsourcing analysis, applications, and theory

- Novel uses of wikis and blogs in science, problem solving,

- Studies on the use of citizen science and human-based computing

- Novel modes of distributed collaboration

- User trust and reputation

- Terrorist network identification

Track: Security Technologies

- Information hiding and watermarking

- Security processor / chip

- Encryption and Decryption algorithm

- Mobile device security

- Code analysis

- Trusted computing

- Software security

- Black box & White box testing

- Penetration testing

- Model driven security

Track: Cyber Crime

- Collaboration in adversarial environments

- Studies of abuse tactics and patterns

- Standards for abuse reporting and monitoring

- User identity issues that relate to the conference topics

- Phishing Attacks, Real Case Studies on Phishing

- Links between Scam, Fraud and Spam

- Case studies on scam & fraud , Cyber Forensics

Track: Security Management

- Information Security Management System

- Security Operation Center

- System security architecture

- Framework and standards

- Disaster recovery

- IT control and audit

Track: Spam Economics

- Modeling & analysis of economics of abuse, phishing, spam, & fraud

- Studies on Cost Benefit Analysis of Spam

- Money Laundering

- Underground Spam Economy

========================================================================
==

Important Dates

========================================================================
==

Abstract Deadline 5th April 2011

Submission Deadline 15th April 2011

Author Notification 15th June 2011

Final Accepted Papers Due 15th Aug 2011

Conference Dates 1st & 2nd Sept 2011

========================================================================
==

********CEAS 2011 is a ERA-B Conference********

Warm Regards

Conference General Chair

Vidyasagar M. Potdar

CEAS 2011

http://ceas2011.debii.edu.au/

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus