exploit the possibilities

c0c0n 2019 Call For Papers

c0c0n 2019 Call For Papers
Posted Apr 5, 2019
Site is-ra.org

The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
MD5 | 7249c0266d14ba00f16c8728632d4033

c0c0n 2019 Call For Papers

Change Mirror Download
#################################################################
c0c0n XII | The cy0ps c0n - Call For Papers & Call For Workshops
#################################################################

Sep 25-28, 2019 - Grand Hyatt, Kochi (Cochin), Kerala, India

Buenos Dias from the God's Own Country!

We are extremely delighted to announce the Call for Papers and Call for
Workshops for c0c0n 2019 <http://www.is-ra.org/c0c0n/>, a 4-day Security and
Hacking Conference (2 day conference and 2 day pre-conference workshop),
full of
interesting presentations, talks and of course filled with fun!

>> c0c0n-XI Mashup Video - https://www.youtube.com/watch?v=K-MY3TzQfhs
>> c0c0n-X Mashup Video - https://www.youtube.com/watch?v=8xl2FY4hsTY

The conference tracks / themes are divided as follows:

>> Critical Infrastructure & SCADA networks Security
# IoT
# WoT
# Telecom
# ICS
# SCADA
# Smart City
>> Mobile and Web Security
>> Dark-Web and Open Source Intelligence
# Social Media Intelligence
# Artificial Intelligence
>> Cryptography
>> Offensive Security and Information Warfare
# Malware
# Ransomware
# Advanced Persistence Threats (APT)
>> Banking, Financial and Economic Warfare
# E-Banking
# Fraud Risk Management
# BlockChain and Bitcoin
>> Governance Risks and Compliance (GRC)
# Digital Forensics

We are expecting conference and workshop submissions on the following
topics,
(but not limited to):

>> Smart Cities
>> Cloud Security
>> Browser Security
>> Honeypots/Honeynets
>> Offensive forensics
>> Software Testing/Fuzzing
>> Network and Router Hacking
>> WLAN and Bluetooth Security
>> Hacking virtualized environment
>> Lockpicking & physical security
>> National Security & Cyber Warfare
>> Open Source Security&Hacking Tools
>> Web Application Security & Hacking
>> Exploiting Layer 8/Social Engineering
>> Malware analysis & Reverse Engineering
>> New Vulnerabilities and Exploits/0-days
>> Advanced Penetration testing techniques
>> Antivirus/Firewall/UTM Evasion Techniques
>> IT Auditing/Risk management and IS Management
>> Cyber Forensics, Cyber Crime & Law Enforcement
>> Mobile Application Security-Threats and Exploits
>> Critical Infrastructure & SCADA networks Security


Presentations/topics that haven't been presented before will be preferred.


#############################
Submission Guidelines for CFP
#############################

Email your submission to: cfp [at] is-ra [dot]org
Email subject should be: CFP c0c0n XII - <Paper Title>
Email Body:

Personal Information:
=====================

Speaker Name:
Job Role/Handle:
Company/Organization:
Country:
Email ID:
Contact Number:
Speaker Profile: (max 1000 words)

If there is additional speaker please mention it here following the above
format.

Presentation Details:
=====================
Name/Title of the presentation:
Paper Abstract: (max 3000 words)
Presentation Time Required (20, 30, 50, 90, 120 Minutes)
Category (New Research / Current Research or Open Source Project)
Is there any demonstration? Yes or No
Are you releasing any new tool? Yes or No
Are you releasing any new exploit? Yes or No
Have you presented the paper before on any other security / technology
conference(s)? Yes or No

Other Needs & Requirements:
===========================

Do you need any special equipment?
We will be providing 1 LCD projector feed, 2 screens, microphones, wired
and/or wireless Internet.
If you have any other requirement, Please mention it here and the reason.

#############################
Submission Guidelines for CFW
#############################

Email your submission to: cfw [at] is-ra [dot]org
Email subject should be: CFW c0c0n X - <Workshop Title>
Email Body:

Personal Information:
=====================

Speaker Name:
Job Role/Handle:
Company/Organization:
Country:
Email ID:
Contact Number:
Speaker Profile: (max 1000 words)

If there is additional speaker please mention it here following the above
format.

Workshop Details:
=====================
Name/Title of the Workshop:
Workshop Objective (max 3000 words):
Course Content (ToC):
Pre-requisite:
Participants Requirements:
Duration (1/2 day):
Who should attend:
What to expect:
What not to expect:
Have you conducted the workshop before on any other security / technology
conference(s)? Yes or No

Other Needs & Requirements:
===========================

Do you need any special equipment?
We will be providing 1 LCD projector feed, 1 screens
Do you (Trainer) need Internet access during the workshop?
Do the participants need Internet access during the workshop?
If you have any other requirement, Please mention it here and the reason.

#####################
Remember these Dates!
#####################

CFP/CFW Opens: 08 Mar 2019
CFP Closing Date: 12 May 2019
Conference Dates: 27 - 29 Sep 2019
Workshop Dates: 25 - 26 Sep 2019

*NOTE:* We do not promote vendor/product oriented submissions hence it will
be rejected.

##################
Speaker Benefits:
##################

For New and Innovative Research

>> Complimentary Conference registration.
>> Complementary Accommodation for 3 nights.
>> Invitation to Day 1 Networking Dinner / Party.
>> Travel Reimbursement (maximum upto below mentioned amount)
# International Speaker (outside India) (USD $500)
# Speakers from India (INR Rs.6000)
>> Only one speaker will be eligible for the benefits in case there are two
or
more speakers for a talk.

For Current Research, Open Source Projects, etc

>> Complimentary Conference registration.
>> Complementary Accommodation for 3 nights.
>> Invitation to Day 1 Networking Dinner / Party.

Thanks and Regards,

- c0c0n XII Team -


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close