Categories |
![]()
SECURITY
![]()
CRIMINOLOGY
![]()
COMPUTER SCIENCE
![]()
LAW
|
About |
The emergence and commoditization of cyber-criminal activities calls for new empirical methods, measures, and technologies to quantify and understand offender operations across all forms of cyber-crime: from malware engineering and attack delivery, to running underground operations trading illegal goods such as drugs and illegal pornography, to spreading disinformation and planning (cyber-)terrorism operations. Without appropriate scientific measures of cyber-offender and attacker operations, capabilities, and resources, it remains impossible to derive sound policies, strategies and technologies that appropriately address realistic and evidence-based attacker and offender models. The 2nd Workshop on Attackers and Cyber-Crime Operations (WACCO 2020) aims to provide a venue for research and discussion on cyber-criminal activities. WACCO 2020 is co-located with the 5th IEEE European Symposium on Security and Privacy (EuroS&P 2020) in Genoa, Italy on June 15, 2020. |
Call for Papers |
||||||||
WACCO 2020 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.
Important Dates All deadlines are Anywhere on Earth (AoE = UTC-12h).
SubmissionPapers should be written in English and formatted following the IEEE guidelines for EuroS&P 2020 reported here. Papers must be typeset in LaTeX in A4 format (not "US Letter") using the IEEE conference proceeding template supplied by IEEE EuroS&P. We suggest you first compile the supplied LaTeX source as is, checking that you obtain the same PDF as the one supplied, and then write your paper into the LaTeX template, replacing the boilerplate text. Please do not use other IEEE templates. Failure to adhere to the page limit and formatting requirements can be grounds for rejection. Anonymous submissionsPapers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected. PublicationsAll papers will be published by IEEE CS and posted on the IEEE digital libraries. At least an author for each accepted paper is expected to present their paper at the workshop. This year WACCO will adopt the REFSQ model for paper presentation, where authors and audience are structurally engaged in the discussion. As a highly multidisciplinary workshop, we expect this model to foster discussion and exchanges from a multitude of different perspectives. Presenting authors and members of the audience will be contacted by the chairs before the workshop for the (short) necessary preparations. |
Summary |
WACCO 2020 : IEEE Workshop on Attackers and Cyber-Crime Operations will take place in Genoa, Italy. It’s a 1 day event starting on Jun 15, 2020 (Monday) and will be winded up on Jun 15, 2020 (Monday). WACCO 2020 falls under the following areas: SECURITY, CRIMINOLOGY, COMPUTER SCIENCE, LAW, etc. Submissions for this Workshop can be made by Feb 21, 2020. Authors can expect the result of submission by Apr 10, 2020. Upon acceptance, authors should submit the final version of the manuscript on or before Apr 24, 2020 to the official website of the Workshop. Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines. Other Details of the WACCO 2020
|
Credits and Sources |
[1] WACCO 2020 : IEEE Workshop on Attackers and Cyber-Crime Operations |