ECIW 2012 Home
   Call for Papers
   Submission Guide
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2011
   ECIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
ECIW 2012
5-6 July, Laval, France
Home >> ECIW >> ECIW 2012 >> eciw12-call-papers
WWW ACI   At a glance Calendar RSS Feed Contact us

 

Click Here!

 

Click Here!

 

CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round Table Proposals, non-academic Contributions and Product Demonstrations

 




Read the
submission guidelines




Download the cfp
in .pdf format


 

 













Tell a friend

 


The 11th European Conference on Information Warfare and Security (ECIW) is an opportunity for academics, practitioners and consultants from Europe and elsewhere who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.  


Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.


Selected papers presented at the Conference will be considered for publication in a special issue of both the Journal of Information Warfare: http://www.jinfowar.com. and the International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected papers  from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X)


The conference committee is attracted by both theoretical and practical papers on many subjects, as well as by innovative ideas and experiences. We are also interested in case studies that demonstrate how i-Warfare and security strategies have been applied and the lessons learned. We welcome contributions on many topics, presenting a range of scholarly approaches. theoretical and empirical papers employing qualitative, quantitative and critical methods are eagerly awaited. Action research, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).


In addition to the main themes, submissions are invited to the five mini tracks:
Systems Security: Fact or Fiction chaired by Kevin M. Gleason, Boston Massachusetts, USA:  Cyberdefence in Small States and Challenges of Cyberstrategies co-chaired by Jari Rantapelkonen, Finnish National Defence University, Finland and Aki-Mauri Huhtinen, University of Helsinki, Finland: Teaching and Learning InfoSec chaired by Henrique M. D. Santos, University of Minho , Portugal: Semantic Security for Information Warfare chaired by Amit Jain, BenefitFocus Inc, Charleston, South Carolina, USA and Attribution, Attrition and Anti-Forensics co-chaired by Dr. Helge Janicke, Dr. Tim Watson and Peter Norris De Montfort University, Leicester, UK

 

Submission details are given below. Topics for submissions may include, but are not limited to:

§         i-Warfare principles, theory and policy and techniques

§         Cyber conflict, Cyber-terrorism and Cyber-fraud

§         Physical security

§         National security policy

§         Information security governance and management

§         Information warfare and security education

§         Information Assurance and Information operations

§         Psychological warfare

§         Perception management

§         Legal issues concerned with information warfare and e-Crime

§         Ethical, political and social issues relating to information warfare

§         SMEs - Small-to-medium Size Enterprises Security issues

§         Critical national infrastructure protection

§         The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)

§         Hacking and cracking

§         Biometrics

§         e-Intelligence/counter-intelligence

§         Cryptography : classical  and malicious

§         Networked Centric War

§         Network anomaly detection models

§         Malware and anti-malware technologies

§         Non-traditional enemies

§          

§         Wireless Threats

§         Reflector attacks

§         Computers-as-weapons

§         Risk Management

§         Virtual Intrusion Detection

§         Collaborative decision making

§         Acute situational awareness

§         Firewalls

§         Phishing and spam

§         Digital forensics

§         Current Anti Virus Technologies

§         PSYOPS

§         Mobile Virus

§         RFID Virus

§         ISO 27001

§         Defence steganography and Unidirectional linguistic steganography

§         Traffic classification

§         Public Key Infrastructure

§         Machine Learning Risk

§         Mathematical-filtering

§         SecureMDA

§         Image-processing

 

Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.


If you would be interested in preparing and chairing a mini track, please contact the Conference Director, Sue Nugus.

 

Mini Track Call for Papers on Systems Security: Fact or Fiction   Click icon to download a .pdf

Track Chair: Kevin M. Gleason, Boston, Massachusetts, USA



Kevin M. Gleason

 

As a typical child of the post WWII era we believed our town, state and country was able to endure most any hardship. The images expressed by local and federal government and the mass media was of a rock-hard core upholding business and finance, the infrastructure (telecommunications and transportation) and of a network (military and civil defence) protecting its citizens from calamities natural and other. Recent worldwide events have begun to erode this Sense of Secure.


The ‘Systems Security’ mini-track takes an introspective look into the illusion we call ‘Security’. Systems may include, but not limited to, any information, infrastructure or national resource. The purpose of this effort to identify and fortify potential breaches before they become targets in reality or of propaganda.


Topics for this track may include (but are not limited to) threats in:

 

§           Information reliability

§           Risk management

§           Infrastructure protection

§           Natural disasters

§           Jamming, propaganda, denial of service (cell phones, social media, internet)

§           Other related topics

§            Protection of natural resources, water purification and distribution

§            Production of food, its quality control and tracking

§            Extraction of raw materials for power/energy, its  generation, distribution

§            Banks, financial support, massive unemployment, the economy

 

Submissions can be made on-line directly on the Abstract submission page.

Mini Track Call for Papers on Cyberdefence in Small States and Challenges of Cyberstrategies   Click icon to download a .pdf

Track Co-Chair: Jari Rantapelkonen, Finnish National Defence University, Finland and Aki-Mauri Huhtinen, University of Helsinki, Finland



Jari Rantapelkonen


Aki-Mauri Huhtinen

 

The objective of this mini track is to study cyberspace as a dimension with new challenges and threats, and their impact on the open society. We are particularly interested in research that considers small states, for example, the Baltic and Nordic regions. There is also the question of cyberstrategies and how we can assess the potential implications for society and the armed forces as well as the need to identify what is known, and what is unknown.


Topics for this track may include but are not limited to in:

§       Cyberspace and Small States

 

§         Issues of cyberspace in Small States

§         The state of nature in cyberspace and its problematization within Baltic and Nordic Framework

§         Different perspectives (technology, human, threat, efficiency) for cyberspace and their impacts

 

§       Small States’ Cybersecurity Strategies

 

§       Baltic and Nordic cybersecurity strategies

§       Impact of strategies

 

§       Cyberdefence in practice, case studies (examples)

 

§      Leadership

§      Cyber operations (vulnerabilities/attacking/defending/critical information)

§      Nordic narratives of cyberspace, cybersecurity, cyberstrategy and cyberdefence

§      Social media

§      Law issues

§      Training and education

§      Humans as a critical part of cyberdefence

§      Simulation

§      Research issues, and unknown areas of interest

§      Lessons learned from MNE 7

 

Submissions can be made on-line directly on the Abstract submission page.

Mini Track Call for Papers on Teaching and Learning InfoSec   Click icon to download a .pdf

Track Chair: Henrique M. D. Santos, University of Minho , Portugal

 


Henrique Santos

 

Information Security, as a discipline, covers a broad spectrum of scientific and technological areas, with a very dynamic nature due to continuous changes. Academia, professional certification institutions and normalization institutions recently published some attempts to define a proper Body Of Knowledge (BOK) required to clearly define the discipline. Despite the convergences there are a lot of open questions concerning, for instance, the background required, the best learning practices, the right set of skills for different professional profiles or even how the current courses are preparing adequate professionals for such a dynamic area.


This mini-track is an opportunity to bring together researchers, teachers and professional organization members, promoting a forum to discuss their different perspectives aiming to improve current Information Security curricula and learning environments.


Topics for this track may include but are not limited to:

§           Information Security Body of Knowledge

§           International Standards and Certifications of Security Education

§           Experimental Information Security Education

§           Evaluation of Information Security Education

§       Cyber Exercises

§       Information Security Professionals

§       Teaching Cyber Ethics

§       Other related topics

 

Submissions can be made on-line directly on the Abstract submission page.

Mini Track Call for Papers on Semantic Security for Information Warfare   Click icon to download a .pdf

Mini Track Chair: Amit Jain, BenefitFocus Inc, Charleston, South Carolina, USA



Amit Jain

 

The increasing reliance of today’s military, civil and commercial infrastructure on computing has made it an easy target for those who aim to disrupt normalcy. This has underlined cyber-security to be one of the most urgent challenges facing the global community.  Current cyber-security challenges cross a range of disciplines and fields to include businesses, governmental policies, risk management, military strategy, and law. Solutions require the use of real time, disparate knowledge and information for creating a fitting response to the threatening events with a credible authorization system utilizing the available contextual, and geospatial information it has about the events and involved actors.


Semantic Web technologies with a Web of interlinked data aim to facilitate a global platform for data and information integration as well as for intelligent search and querying. They seek to transform the current document and structure oriented data into more meaningful and expert knowledge, which can be accessed in an efficient and automated manner.


The aim of this track would be to explore the usage of Semantics in developing Information Security models for data and information in critical enterprise infrastructure. The scope would cover a wide range of topics to include underlying Software Assurance, Cyber Security, Data Privacy, Semantic Models, Security policies with data reasoning and many more. The track is open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Systems implemented and lessons learnt, Technical/marketing/business presentations, Demos, Tutorials, and Panels


Topics for this track may include but are not limited to:

§       Trustworthy Infrastructures and Services

§       Smart and Secure Information Access and Querying with Semantic Data Alignment

§       Policy/Standards driven architectures for Semantic Web

§       Semantic Web Security & Privacy

§       Privacy-preserving data management systems

§       Security in Digital Health Care

§       Ontologies, Reasoning and representation languages for security models

§       Engineering of Semantic Web applications

§       Methods for linking, integrating and federating Data on the Web

§       Other related tpics

 

Submissions can be made on-line directly on the Abstract submission page

Call for Papers on Attribution, Attrition and Anti-Forensics   Click icon to download a .pdf

Mini Track Chair: Dr. Helge Janicke, Dr. Tim Watson and Peter Norris, De Montfort University, Leicester, UK



Helge Janicke


Tim Watson

 

This track is dedicated to the identification of attackers and the attribution of cyber-attacks to individuals, hacking-groups, governments or other non-state actors.  This includes attack profiling, linguistic analysis and technologies for situational awareness.  The track also considers anti-forensic techniques that can be used by attackers to disguise their true identity or cause additional harm to those investigating their actions.  Many attacks are disguised using botnets and routed through various jurisdictions to foil investigators attempts to trace their source.  This track also considers research on the evolution and graceful degradation of systems under attack and what level of attrition inflicted by opponents can be tolerated whilst still maintaining their confidentiality, integrity and availability.  We welcome submissions describing models, initial research results, case-studies and experience and evaluation papers from practitioners and academics related to the following topics.


Topics for this track may include but are not limited to:

§           Profiling and Attribution

§           Distributed Incident Analysis/Response and Pro-Active Defence

§           Situational Awareness and Data Visualisation

§           Network Forensics and Anti-Forensics Techniques

§           Self-Protecting, Self-Healing and Adaptive Security Systems

§           Cyber Attrition, Anonymity and Confidentiality in Cyber Attack & Defence

 

Submissions can be made on-line directly on the Abstract submission page

 

 

Submission details

Abstract details:

All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 16 December 2011. Please read the Abstract Guidelines section of the website before submitting.

Submission:

Submissions should be made via the online form. Please ensure that all required fields are completed. Abstracts must include the proposed title for the submission, the full names (first name and surname, not initials); postal addresses and email addresses of all authors and a telephone number for at least one contact author. Please indicate clearly if the contact author is not the lead author and select the appropriate submission track.

Full paper:

Only required for academic submissions once the abstract has been selected, no more than 5,000 words to be received by 3 February 2012. Papers should be submitted as .doc or .rtf file attachments by email to the Conference Manager, Charlotte Hall (charlotte@academic-conferences.org ).

 

Important information

The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference. The authors of abstracts, which describe a relevant paper, will receive a notification of abstract acceptance. All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced. Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. Therefore if multiple papers are accepted for presentation different co-authors need to present each paper. Author registration and payment must be completed by 1 June 2012.

 

Conference proceedings Accreditations



 

The ECIW conference proceedings are:

·          listed in the Thomson Reuters ISI Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings)

·          listed in the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP)

·          listed in the Thomson Reuters ISI Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).

·          indexed by the Institution of Engineering and Technology in the UK.

 

 

 

 

 

 

 

Proceedings for previous ECIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.

Important dates

Abstract submission deadline:

16 December 2011

  Now closed

Notification of abstract acceptance:

21 December 2011

 Completed

Full paper due for review:

3 February 2012

  Completed

Notification of paper acceptance (subject to any requested changes)

13 April 2012

  Completed

Earlybird registration closes

27 April 2012

  Now closed

Final paper due (with any changes):

11 May 2012

  Completed

Author registration final date:

1 June 2012

  Completed

 

Last updated 12 June 2012

 

 

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2003-2012 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38