exploit the possibilities

AthCon 2012 Call For Papers

AthCon 2012 Call For Papers
Posted Jan 13, 2012
Authored by Christian Papathanasiou | Site athcon.org

The AthCon 2012 Call For Papers has been announced. It will take place in Athens, Greece on May 3rd through the 4th, 2012.

tags | paper, conference
MD5 | f67b68982774a5f382e2c5ccb6ec220b

AthCon 2012 Call For Papers

Change Mirror Download
The Call For Papers (CFP) for AthCon 2012 which will take place in
Athens, Greece on the 3-4th of May, 2012 will only be open for a
30-day window.
The important dates are as follows:

• 01/01/2012: CFP Opens
• 31/01/2012: CFP Closes
• 15/02/2012: Acceptance Notification
• 30/02/2012: Conference Schedule Publication
• 20/03/2012: Camera Ready Material

As AthCon is a single track conference this year, we are expecting
fierce competition. Thus, please plan early and follow the guidelines
in this section for your work to be considered for 2012.


All paper submissions are expected to be written in and will be
reviewed in English. You are welcome to submit material, regardless of
your organisation. AthCon welcomes cutting edge information security
research from industry, researchers, professionals, academics,
government and the underground security community. As a guideline, the
following topics are rendered relevant for 2012:

• Android/iPhone/Windows Mobile research


• SmartGrid


• Biometrics

• Digital Forensics
• Exploitation Tactics
• Java & .NET Security
• Malware Analysis
• Operating System Security (7, XP, Vista, GNU/Linux, OS X, Plan 9, *BSD, …)
• Personal Area Network hacking
• Rootkit Detection, Techniques, and Defenses
• Source Code Auditing & Review
• Steganography & Cryptography in Information Security
• Web Framework Security

Please note we are non-product, non-vendor biased security conference,
and do not accept vendor pitches.


The CFP program committee is comprised of the following members:
• Panagiotis Kotsiopoulos, [Senior IT Security Consultant]
• Athanasios Kostopoulos, [R&D Engineer]
• Emmanouel Kellinis, [Senior IT Security Consultant]
• Glafkos Charalambous, [Chief Technology Officer  / OWASP Cyprus]
• George Nicolaou, [Indepedent IT Security Consutlant]
• Dimitris Koukoutsas, [Indepedent IT Security Consutlant]


Papers and presentations are now being accepted. All proposals should
be submitted via email to cfp@athcon.org; due to the love of spam. The
subject must begin with: “[AthCon 2012 CFP]“. Furthermore, your email
must include the following information in the body:

• Date of Submission: dd/mm/yyyy
• Primary Speaker Name: Name Surname (optional: Alias)
• Employer/Organisation: Company or Organisation (please choose one, not both)
• Primary Phone Number:
• Primary Email Address:
• Additional Speakers’ name(s)*:
• Submission Type: Presentation/Training
• Country:
• Short Biography: (max 100 words)
* AthCon will only be able to cover the expenses of a single speaker
attending the conference. Any additional speakers for an individual
talk, hold the sole responsibility of covering their expenses in
attending the conference.


Your mail must have as an attachment a flat txt file with the
following information regarding your presentation:
• Name of the Presentation (max 10 words)
• Synopsis of Talk (max 250 words) Describe, in no more than 250
words, how your talk will contribute to the knowledge of information
security and what new areas and needs it addresses. Remember, it is
not enough to state that it works; the CFP Committee needs to
understand your work correctly. Assist them in doing just that.
Describe, in no more than 250 words which areas from the AthCon CFP
for 2011 your talk is relevant to and why. In no more than 1000 words
present an outline of your talk: We are interested in you being able
to keep the interest of a highly technical and skilled audience for
the duration of the presentation:
• Introduction will involve…
• Motivation behind this work is…
• Overall, the audience should benefit by…
• The conclusions drawn from your topic are…
Finally, the following general information should be included:
• My talk is innovative and should be accepted because…
• You can find information about my talk (or at least my topic area)
in the following URLs:
All submissions entered in the correct format above will be considered
for review. The review will take place by the AthCon CFP Committee. If
you are excepted to present at AthCon, we will require a final version
of the above descriptions, plus the slides by the camera-ready date.
This is for your talk to be included in the proceedings of AthCon
2012. Remember, we are looking for cutting edge and beyond! Good luck…


As a speaker for AthCon, you are entitled to the following:

• One economy class return-ticket to Athens, Greece
• 2 nights of accommodation in the conference hotel (Semiramis Hotel, Athens)
• Breakfast, lunch, daily coffee breaks
• Speaker activities before during and after the conference
• Speaker closing party ticket and relevant access

As a trainer for AthCon, you are entitled to the following:

• 50% of the net profit of the class
• 2 nights of accommodation in the conference hotel (Semiramis Hotel, Athens)
• Breakfast, lunch, daily coffee breaks
• Free Speaker Badge for the conference
• Speaker activities before during and after the conference
• Speaker closing party ticket and relevant access

If you are selected for the "Turbo Talks" track you will only receive
entrance to the conference. As a "Turbo Talks" presenter, you WILL NOT
receive compensation for lodging or travel. AthCon sponsors or their
respective employees are ineligible for compensation for lodging or


AthCon official webpage: http://www.athcon.org

AthCon official hashtag: #athcon

AthCon official Twitter page: http://www.twitter.com/athc0n

AthCon official Facebook page: http://www.facebook.com/athcon

AthCon photos from 2011: http://www.facebook.com/athcon?sk=photos


On behalf of the AthCon organising committee

Christian Papathanasiou / chris@athcon.org


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    16 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By