First Workshop on Attackers and Cyber-Crime Operations
IEEE European Symposium on Security and Privacy 2019
June 20 - Stockholm, Sweden
Call for Papers
WACCO 2019 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.
Topics of interest include, but are not limited to:
- Empirical studies on attacker operations and communities
- Novel methods to perform attacker measurements at scale across several communities
- Cooperation and trust as a source of attackers’ effectiveness
- Attackers’ skill set
- Attackers’ operational security
- Measuring the spread of false information campaigns on social media
- Quantitative and qualitative methods to measure, track, and counter cybercrime
- Cybercrime measurement and networks
- Cybercrime policy
- Economics of cybercrime
- Profiling of cybercriminals
- Security metric design and evaluation
- Security patch measurement
- Statistical exploration and prediction of security incidents
- Open Source Intelligence and digital footprints
All deadlines are Anywhere on Earth (AoE = UTC-12h).
|Paper Submissions Due||February 25, 2019|
|Acceptance Notice to Authors||April 5, 2019|
|Camera ready for accepted papers||April 22, 2019|
|Workshop||June 20, 2019|
Papers should be written in English and formatted following the IEEE guidelines for Euro S&P 2019. WACCO welcomes full as well as position papers for submission. Length limits are of 10 pages and 4 pages respectively. Position papers should present new open and interesting questions that the community should address or open questions that past research papers have not yet addressed. We expect position papers to be presented in panels or poster-platform sessions.
Papers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected.
All papers will be published by IEEE CS and posted on the IEEE digital libraries. At least an author for each accepted paper is expected to present their paper at the workshop.
Please submit your submission through EasyChair.
For more information click "LINK TO ORIGINAL" below.
This opportunity has expired. It was originally published here: