The fifth annual APWG eCrime Researchers Summit once again will be
held in conjunction with the 2010 APWG General Meeting between October
18-20, 2010 at Southern Methodist University in Dallas, TX.
http://www.ecrimeresearch.org/2010/cfp.html

eCRS 2010 will bring together academic researchers, security
practitioners, and law enforcement to discuss all aspects of
electronic crime and ways to combat it, Topics of interests include
(but are not limited to):

    * Phishing, rogue-AV, pharming, click-fraud, crimeware, extortion and emerging attacks.
    * Technical, legal, political, social and psychological aspects of
      fraud and fraud prevention.
    * Malware, botnets, ecriminal/phishing gangs and collaboration, or money laundering.
    * Techniques to assess the risks and yields of attacks and the
      success rates of countermeasures.
    * Delivery techniques, including spam, voice mail and rank
      manipulation; and countermeasures.
    * Spoofing of different types, and applications to fraud.
    * Techniques to avoid detection, tracking and takedown; and ways to block such techniques.
    * Honeypot design, data mining, and forensic aspects of fraud prevention.
    * Design and evaluation of user interfaces in the context of fraud and network security.
    * Best practices related to digital forensics tools and
      techniques, investigative procedures, and evidence acquisition,
      handling and preservation.

Accepted papers will appear in the IEEE Digital Library. In addition,
cash awards will be given for the best paper overall and the best
student co-authored paper. A limited number of cash travel awards will
also be made to student authors of papers and posters.
 
		
Instructions for Authors

Submissions should be in English, in PDF format with all fonts
embedded, formatted using the the IEEE conference template, found
here:
http://www.ieee.org/web/publications/authors/transjnl/index.html. Submissions
should include author names, affiliations and acknowledgments. They
should not exceed 12 letter-sized pages, not counting the bibliography
and appendices. Papers should begin with a title, abstract, and an
introduction that clearly summarizes the contributions of the paper at
a level appropriate for a non-specialist reader. Papers should contain
a scholarly exposition of ideas, techniques, and results, including
motivation, relevance to practical applications, and a clear
comparison with related work. Committee members are not required to
read appendices, and papers should be intelligible without
them. Submitted papers risk being rejected without consideration of
their merits if they do not follow all the above
guidelines. Submissions must not substantially duplicate work that was
published elsewhere, or work that any of the authors has submitted in
parallel to any other conference or workshop that has proceedings.

Authors will be asked to indicate whether their submissions should be
considered for the best student paper award; any paper co-authored by
a full-time student is eligible for this award.

Authors of accepted papers must guarantee that their paper will be
presented at the conference. A limited number of stipends are
available to those unable to obtain funding to attend the
conference. Students whose papers are accepted and who will present
the paper themselves are given priority to receive such
assistance. Requests for stipends should be addressed to the general
chair after August 10.

Full papers have to be submitted via EDAS through the following short
link: http://edas.info/N8471. First, papers have to be registered,
then authors can upload their papers. A successful submission can be
viewed in EDAS, and a confirmation email is sent to the corresponding
author. Please make sure you receive that confirmation email when you
submit, and follow the directions in that email if you require any
follow up.  Research In Progress (RIP)

A special category is available in the paper submission system for
Research in Progress (RIP). This category allows for research that is
not yet ready for publication but would be of interest to other
researchers for presentation and discussion. For consideration in this
category please submit an extensive abstract via the paper submission
system.

RIPs have to be submitted via EDAS through the following short link: http://edas.info/N8471. First, RIPs have to be registered, then authors can upload their papers. A successful submission can be viewed in EDAS, and a confirmation email is sent to the corresponding author. Please make sure you receive that confirmation email when you submit, and follow the directions in that email if you require any follow up.
Posters

We also seek poster abstracts describing recent or ongoing research or
experience in all areas related to the prevention of electronic
crime. Submission of late breaking results and work in progress is
especially encouraged. Posters will not be published, and thus may
substantially overlap published papers or papers simultaneously
submitted to a conference or journal. Submissions should follow the
same formatting instructions as refereed papers, but should be at most
two pages and need not be blinded or include abstracts, keywords,
copyright boxes, etc.

The conference will include a poster session in which authors will
exhibit their posters. Note, poster abstracts should be formatted like
short papers, not like posters. Authors of accepted posters will be
sent information about how to prepare and format posters for the
conference.

Poster abstracts have to be submitted via EDAS through the following
short link: http://edas.info/N8471. First, poster abstracts have to be
registered, then authors can upload their abstracts. A successful
submission can be viewed in EDAS, and a confirmation email is sent to
the corresponding author. Please make sure you receive that
confirmation email when you submit, and follow the directions in that
email if you require any follow up.
Important Dates
All submissions due by 11:59pm US EDT

    * Full paper submissions due: May 30, 2010
    * RIP paper submissions due: June 13, 2010
    * Paper notification: Aug 1, 2010
    * Poster submissions due: August 29, 2010
    * Poster notifications: September 5, 2010
    * Conference: October 18-20, 2010
    * Camera ready due: October 27, 2010 

Organizing Committee

General Chair: Randy Vaughn, Baylor University

Program Co-Chairs:

    * Suku Nair, Southern Methodist University
    * Paul Watters, University of Ballarat

Steering Committee:

    * Don M. Blumenthal, Global Cyber Risk LLC
    * Jay Brennan, Mitre
    * Markus Jakobsson, Palo Alto Research Center
    * Oliver Friedrichs, Immunet
    * Susanne Wetzel, Stevens Institute of Technology

Technical Program Committee:

    * Saeed Abu-Nimeh, Websense Security Labs
    * Don Blumenthal, DMB Associates, LLC
    * Jay Brennan, Mitre
    * Hakki Cankaya, University of Texas at Dallas
    * John Carlson, Baylor University
    * Ebrima Ceesay, Booz Allen Hamilton
    * Ebru Celikel, University of North Texas
    * Madhusudhanan Chandrasekaran, Amazon
    * Senthil Cheetancheri, SonicWall
    * Thomas Chen, Swansea University
    * Michael Collins, RedJack
    * Oliver Friedrichs, Immunet
    * Markus Jakobsson, PARC
    * Ponnurangam Kumaraguru, IIIT Delhi
    * Tyler Moore, Harvard University
    * Thomas Morris, Mississippi State University
    * Steven Myers, Indiana University
    * Padmaraj Nair, Fujitsu Limited
    * Dario Nappa, TriQuint Semiconductor
    * Jose Nazario, Arbor Networks
    * Bryan Parno, Carnegie Mellon University
    * Steve Sheng, ICAAN
    * Gary Warner, University of Alabama at Birmingham
    * Susanne Wetzel, Stevens Institute of Technology