IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022
WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022

WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022

Genoa, Italy
Event Date: June 06, 2022 - June 06, 2022
Submission Deadline: March 14, 2022
Notification of Acceptance: April 08, 2022
Camera Ready Version Due: April 20, 2022




Call for Papers

WACCO 2022

*** DEADLINE EXTENSION ***


The WACCO 2022 submission deadline has been extended to the 14th of March 2022 (11:59pm AoE).


Fourth Workshop on Attackers and Cyber-Crime Operations

IEEE European Symposium on Security and Privacy 2022

https://wacco-workshop.org/
June 6, 2022 - Genoa, Italy

Important dates:
Paper submissions due: 14/03/2022 AoE
Acceptance Notice to Authors: 08/04/2022
Publication-ready Papers Submitted: 20/04/2022


The emergence and commoditization of cyber-criminal activities calls for new empirical methods, measures, and technologies to quantify and understand offender operations across all forms of cyber-crime: from malware engineering and attack delivery, to running underground operations trading illegal goods such as drugs and illegal pornography, to spreading disinformation and planning (cyber-)terrorism operations. Without appropriate scientific measures of cyber-offender and attacker operations, capabilities, and resources, it remains impossible to derive sound policies, strategies and technologies that appropriately address realistic and evidence-based attacker and offender models.

WACCO 2022 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.



Topics of interest include, but are not limited to:

- Empirical studies on attacker operations and communities
- Novel methods to perform attacker measurements at scale across several communities
- Cooperation and trust as a source of attackers’ effectiveness - Attackers’ skill set
- Attackers’ operational security
- Measuring the spread of false information campaigns on social media
- Quantitative and qualitative methods to measure, track, and counter cybercrime
- Cybercrime measurement and networks
- Cybercrime policy
- Economics of cybercrime
- Profiling of cybercriminals
- Security metric design and evaluation
- Security patch measurement
- Statistical exploration and prediction of security incidents
- Open Source INTelligence (OSINT) and digital footprints


Review model


Open reports: WACCO promotes an open and transparent review process. Reviews of accepted papers will be published together with the papers and archived in a public github repository associated with WACCO. A link to that repository must be included in all accepted submissions. The reasons why WACCO implements an open report model are the following:

- It documents why the paper was considered positively to contribute to the larger scientific domain it pertains to;
- It provides a critique useful to better delineate research limitations and scope, which can be of particular benefit to young researchers and students alike;
- It provides a structural incentive for reviewers to write constructive and clear reviews;
- It provides a structural incentive for authors to implement reviewer recommendations for the camera-ready version of their paper;
- It provides a critical viewpoint for future work and research follow-ups;
- It provides additional transparency to the quality of the adopted review process and its outcomes.



Submission Types


WACCO encourages submission of full papers and position papers from academia, industry, and government. They should present interesting results for both theory and experimentation in the area of attacker and cyber-crime operations. We also particularly welcome independent reproduction of previous studies or experiments or negative results. We expect full papers to be of 10 pages in length (IEEE Format). Longer papers that document extensive experimentation are full in scope (which could be described in annex of the main body of the paper). Position papers of around 4 pages in length should present new open and interesting questions that the community should address or open questions that past research papers have not yet addressed. We expect position papers to be presented in panels or poster-platform sessions.



Anonymous submissions


Papers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected.



Submission of work that has been previously presented at conferences without proceedings, even if that work is associated with the names of the authors, or is published on online repositories such as ArXiv.org or SSRN, is allowed as long as the submission is fully anonymized. PC members that may recognize the work and its authors are asked to declare conflict on that paper and will not be assigned to it.


Publications


All papers will be published by IEEE CS and posted on the IEEE digital libraries. All authors of accepted papers are expected to present their paper at the workshop.



Organizers



Luca Allodi, Eindhoven University of Technology, the Netherlands ([email protected])

Alice Hutchings, Cambridge University, United Kingdom ([email protected])

Sergio Pastrana, University Carlos III of Madrid, Spain ([email protected])



Programme Committee

See WACCO 2022 website: https://wacco-workshop.org/


Summary

WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022 will take place in Genoa, Italy. It’s a 1 day event starting on Jun 6, 2022 (Monday) and will be winded up on Jun 6, 2022 (Monday).

WACCO 2022 falls under the following areas: CYBERCRIME, CRIMINOLOGY, ECONOMICS OF CYBERCRIME, MEASUREMENTS, etc. Submissions for this Workshop can be made by Mar 14, 2022. Authors can expect the result of submission by Apr 8, 2022. Upon acceptance, authors should submit the final version of the manuscript on or before Apr 20, 2022 to the official website of the Workshop.

Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines.

Other Details of the WACCO 2022

  • Short Name: WACCO 2022
  • Full Name: **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022
  • Timing: 09:00 AM-06:00 PM (expected)
  • Fees: Check the official website of WACCO 2022
  • Event Type: Workshop
  • Website Link: https://wacco-workshop.org
  • Location/Address: Genoa, Italy


Credits and Sources

[1] WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022


Check other Conferences, Workshops, Seminars, and Events


OTHER CYBERCRIME EVENTS

No Hat 2023: No Hat - COMPUTER SECURITY CONFERENCE
Bergamo, Italy
Oct 21, 2023
BDACCIP 2022: The 6th International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
Osaka, Japan
Dec 17, 2022
Cybercrime HICSS 2023: Cybercrime at the 56th Hawaii International Conference on System Sciences
Hawaii
Jan 3, 2023
ICGS3 2022: 14TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY & SUSTAINABILITY
London
Sep 7, 2022
Digital Crime and Forensics 2019: Call for Chapters: Evaluating Emerging Threats and New Research Opportunities in Digital Crime and Forensics
N/A
Jun 17, 2019
SHOW ALL

OTHER CRIMINOLOGY EVENTS

FOSINT-SI 2022: The 2022 International Symposium on Foundations of Open Source Intelligence and Security Informatics.
Turkey
Nov 10, 2022
WACCO 2022: EuroS&P IEEE Fourth Workshop on Attackers and Cyber-Crime Operations
Genoa
Jun 6, 2022
Prohibition 2021: Prohibition of criminal organizations

WACCO 2020: IEEE Workshop on Attackers and Cyber-Crime Operations
Genoa, Italy
Jun 15, 2020
Crime, Justice and Social Harms 2020: Crime, Justice and Social Harms
Keble College, Oxford
Mar 31, 2020
SHOW ALL

OTHER MEASUREMENTS EVENTS

ISPCS 2022: 2022 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication
Vienna, Austria
Oct 2, 2022
WTMC 2022: IEEE Euro S&P 2020 5th International Workshop on Traffic Measurements
Genova, Italy
Jun 15, 2022
M&N 2022: 2022 IEEE International Symposium on Measurements and Networking
Padua, Italy
Jul 18, 2022
IEEE ELECTRONICS 2022: IEEE 26th International Conference ELECTRONICS 2022
Lithuania, Palanga
Jun 13, 2022
PAM 2021: Passive and Active Network Measurement Conference
Virtual
Mar 28, 2021
SHOW ALL