If you like the website, feel free to: Buy Me a Coffee at ko-fi.com

Info! CFPTime is a non-profit organization, community-based. Using CFP Time data (through the site and/or API) is allowed but can't be used for commercial purposes.

APWG Ecrime

City San Diego
Province CA
Country US
Twitter @apwg
Website https://apwg.org/apwg-events/ecrime2018/cfp
Code of Conduct Not populated yet
CFP Deadline

March 2, 2018, 11:55 p.m.   

Conference Date

May 15, 2018, 9 a.m.   


Call for Research Papers
The thirteenth Symposium on Electronic Crime Research (eCrime 2018) will be held between May 15th - 17th 2018 in San Diego, CA.

eCrime 2018 consists of 3 days of keynote presentations, technical and practical sessions, and interactive panels. This will allow for the academic researchers, security practitioners, and law enforcement to discuss and exchange ideas, experiences and lessons learnt in all aspects of electronic crime and ways to combat it.

This conference has two publication tracks to help attract research covering applied, industrial cybercrime research as well as applied and/or theoretical cybercrime academic research. To further strengthen the confidence in each track, there have been two managing chairs and committees appointed for reviewing and selecting papers for each track of the cybercrime conference.

The conference offers travel grants to students who are having issues finding the funding to attend the conference. Note that there is a set final date for requesting the stipend so please get your requests in as soon as possible after hearing back about your paper’s acceptance. eCrime 2018 also has a best paper and runner-up award that is accompanied by a cash reward for the top papers submitted to the academic track only.

Important Dates: (11:59pm US EDT)
Full Papers registration and submission due: March 2nd, 2018
Paper Notifications due: March 19th, 2018
Request for a stipend: April 1st, 2018
Camera ready due: May 1st, 2018
Conference: May 15th-17th, 2018

Academic Track
Topics of interests include (but are not limited to):

Economics of online crime
Measurement studies of underground economies
Models of e-crime
Understanding business structure and return on investment of various types of crime such as phishing, advanced fee fraud, and operating a botnet.
Uncovering and disrupting online criminal collaboration and gangs
Security-related risk assessments
The risks and yields of attacks
Effectiveness of countermeasures
Metrics standards
Conventions in the establishment of tests of efficacy
Attack delivery strategies and countermeasures
Mobile Apps
Social engineering
Instant messaging
Web browser search manipulation
Identification of malware families
Polymorphic malware detection
Mobile malware
Techniques to circumvent detection and sandboxes
Public Policy and Law
Cross-border and public-private law enforcement collaboration
Tension between cybercrime investigation and data privacy regulations (e.g., impact of GDPR on anti-abuse)
Legal and policy issues involving anti-abuse and counter-cybercrime efforts
Economic and incentive issues involving cybercrime
Security assessments of the mobile devices
Mobile App stores and ecosystems
Mobile App privacy
Risk prevention issues
User psychology / cognition / awareness
UI / UX architectures and their contributions to cybercrime suppression and cybercrime success
ICT user resilience / susceptibility to cybercrime
Measurement of user experiences before and during cybercrime events
Psychological and cognitive aspects of deception techniques delivered via ICT
Socio-Technical analyses of security incidents
Cognitive psychology of security, risk and trust and their influence on human behavior before and during cybercrime events
Awareness messaging/training/testing and efficacy measured by all relevant dimensions (e.g. longevity, applicability across exposures, etc.)
Financial infrastructure of e-crime
Criminal payment processing options
Money laundering strategies
Use of crypto-currencies
Underground marketplaces
Crypto Currency and Cybercrime Tools and Responses
Hardware devices to protect encryption keys
Protections for multisig wallets, failures, new ideas
Management and protection of cold storage wallets
Anti-Phishing protections for crypto currencies
Browser plug-ins
Out of band authentication for transactions
Multi-party authentication concepts
Technical, legal, political, social and psychological aspects of fraud and fraud prevention
Industrial Track
Topics of interests include (but are not limited to):

Speaker benefits

Not populated yet