|
||||||||||||||||||||||||||
Submit a paper using the same page as the ICIMP 2007 conference.
Touristic information is available from the hosting conference, ICIMP 2007.
Hotels and travel information is available from the hosting conference page, ICIMP 2007.
Attacks against private and public networks have had a significant spreading in the last years. With simple or sophisticated behavior, the attacks tend to damage user confidence, cause huge privacy violations and enormous economic losses. The International Workshop on Cyber-Fraud, CYBER-FRAUD 2007, focuses on specific aspects related to attacks and counterattacks, public information, privacy and safety on cyber-attacks information. It also targets secure mechanisms to record, retrieve, share, interpret, prevent and post-analyze of cyber-crime attacks. This workshop will provide a forum for interaction among researchers and practitioners working in the area of cyber attacks. We solicit papers dealing with all aspects of any kind of studies, experiences, previsions, comparisons, privacy and economic impacts, and existing technical supports for cyber-attacks. TOPICS OF SPECIAL INTEREST (but not limited to):
INSTRUCTIONS FOR THE AUTHORS The CYBER-FRAUD 2007 Proceedings will be published by IEEE Computer Society Conference Publishing Services, posted on IEEE Xplore Digital Library, and indexed with major indexes. Important deadlines:
Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the EDAS system. Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page. Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance. Technical marketing/business/positioning presentations The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to [email protected]. Tutorials Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to [email protected]. Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. Please send your proposals to [email protected].
Co-Chairs: TPC Members: Philippe Biondi, SecDev-Computer Security/R&D, USA
Tutorials are available from the hosting conference page, ICIMP 2007.
Preliminary program is available from the hosting conference page, ICIMP 2007.
Manuscript preparation is available from the hosting conference page, ICIMP 2007.
Registration form is available from the hosting conference page, ICIMP 2007.
Statistics are available from the hosting conference page, ICIMP 2007.
Photos are available from the hosting conference page, ICIMP 2007.
Awards are available from the hosting conference page, ICIMP 2007. |
||||||||||||||||||||||||||
Copyright (c) 2006, IARIA