what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Breakpoint 2015 Call For Papers

Breakpoint 2015 Call For Papers
Posted May 19, 2015
Authored by bpx | Site ruxconbreakpoint.com

The Breakpoint 2015 Call For Papers has been announced. It will take place at the Intercontinental Rialto in Melbourne, Australia October 22nd through the 23rd, 2015. Breakpoint showcases the work of expert security researchers from around the world on a wide range of topics. This conference is organized by the Ruxcon team and offers a specialized security conference to complement and lead into the larger and more casual Ruxcon weekend conference. Breakpoint caters towards security researchers and industry professionals alike, with a focus on cutting edge security research.

tags | paper, conference
SHA-256 | 19e84712fa0b6cf1b29e7e5db80167952c55e550bfbbec88311c75a7622feec2

Breakpoint 2015 Call For Papers

Change Mirror Download
Breakpoint 2015 Call For Papers
Melbourne, Australia, October 22th-23th
Intercontinental Rialto
http://www.ruxconbreakpoint.com


.[x]. Introduction .[x].

We are pleased to announce Call For Presentations for Breakpoint 2015.

Breakpoint showcases the work of expert security researchers from around the
world on a wide range of topics. This conference is organised by the Ruxcon
team and offers a specialised security conference to complement and lead into
the larger and more casual Ruxcon weekend conference. Breakpoint caters
towards security researchers and industry professionals alike, with a focus on
cutting edge security research.

Breakpoint presents a great opportunity for our selected speakers to receive a
complimentary trip to Australia and experience both the Breakpoint and Ruxcon
conferences, not to mention the great weather, parties, and friendly people.


.[x]. Important Dates .[x].

May 15 - Call For Presentations Open
August 30 - Call For Presentations Close
October 19-21 - Breakpoint Training
October 22-23 - Breakpoint Conference
October 24-25 - Ruxcon Conference


.[x]. Topic Scope .[x].

Topics of interest include, but are not limited to:

o Mobile Device Security
o Exploitation Techniques
o Reverse Engineering
o Vulnerability Discovery
o Rootkit Development
o Malware Analysis
o Code Analysis
o Virtualisation, Hypervisor Security
o Cloud Security
o Embedded Device Security
o Hardware Security
o Telecommunications Security
o Wireless Network Security
o Web Application Security
o Law Enforcement Activities
o Forensics
o Threat Intelligence
o Incident Response


.[x]. Submission Guidelines .[x].

In order for us to process your submission we will require the following
information:

1. Presentation title
2. Detailed summary of your presentation material
3. Name/Nickname
4. Mobile phone number
5. Brief personal biography
6. Description of any demonstrations involved in presentation
7. Information on where the presentation material has or will be presented
before Breakpoint

* Preference will be given to presentations that contain original research
that will be first presented at Breakpoint.
* As a general guideline, Breakpoint presentations are between
45 and 60 minutes, including question time.

If you have any questions about submissions, or would like to make a
submission, please send an email to bpx@ruxconbreakpoint.com


.[x]. Speaker Benefits .[x].

Speakers at Breakpoint will be entitled to the following benefits:

- A return economy airfare to Melbourne (total cost limit applies)
- Three nights accommodation at the Intercontinental Rialto
- Complimentary registration for Breakpoint and Ruxcon conferences
- Invitation to all Breakpoint and Ruxcon parties
- Unlock 'Presented on world's smallest continent' achievement

* All speaker benefits apply to a single speaker per submission.


.[x]. Contact .[x].

If you have any questions or inqueries, contact us at:

* Email: bpx@ruxconbreakpoint.com
* Twitter: ruxconbpx

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close