{"id":896,"date":"2011-01-24T21:21:00","date_gmt":"2011-01-24T21:21:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2011\/01\/24\/brucon-call-for-papers-2011\/"},"modified":"2019-11-09T23:11:22","modified_gmt":"2019-11-09T21:11:22","slug":"brucon-call-for-papers-2011","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2022\/2011\/01\/24\/brucon-call-for-papers-2011\/","title":{"rendered":"Brucon Call For Papers 2011"},"content":{"rendered":"<p><span style=\"font-family:courier new\">Call for Papers BruCON.v3 2011<\/span><br \/><span style=\"font-family:courier new\">==============================<\/span><\/p>\n<p><span style=\"font-family:courier new\">Brussels,  Belgium &#8212; This is the call for papers (CFP) and participation for the 3rd  edition of BruCON, a 2-day Security and Hacking Conference full of  interesting presentations, workshops and security challenges.<\/span>  <span style=\"font-family:courier new\">BruCON  is an open-minded gathering of people discussing computer security,  privacy, and information technology. The conference tries to create  bridges between the various actors active in computer security world including (but not limited to) hackers, security professionals, security  communities, non-profit organizations, CERTs, students, law enforcement  agencies,etc. <\/span><span style=\"font-family:courier new\">The conference will be held in Brussels on the 19th and 20th of September 2011 on the VUB Campus.<\/span><\/p>\n<p><span style=\"font-family:courier new;font-size:100%\">Scope<br \/>=====<br \/>Topics of interest include, but are not limited to :<br \/>* Electronic\/Digital Privacy<br \/>* Wireless Network and Security<br \/>* Attacks on Information Systems and\/or Digital Information Storage<br \/>* Web Application and Web Services Security<br \/>* Lockpicking &amp; physical security<br \/>* Honeypots\/Honeynets<br \/>* Spyware, Phishing and Botnets (Distributed attacks)<br \/>* Hardware hacking, embedded systems and other electronic devices<br \/>* Mobile devices exploitation, Symbian, P2K and bluetooth technologies<br \/>* Electronic Voting<br \/>* Free Software and Security<br \/>* Legal and Social Aspect of Information Security<br \/>* Software Engineering and Security<br \/>* Security in Information Retrieval<br \/>* Security aspects in SCADA, industrial environments and &#8220;obscure&#8221; networks<br \/>* Forensics and Anti-Forensics<br \/>* Mobile communications security and vulnerabilities<br \/>* Information warfare and industrial espionage<br \/>* Social Engineering<br \/>* Virtualisation Security<br \/>* &#8230;<\/p>\n<p>Deadlines<br \/>=========<\/p>\n<p>The following dates are important if you want to participate in the CfP<br \/><\/span><\/p>\n<ul style=\"font-family:courier new\">\n<li><span style=\"font-size:100%\">Abstract submission: no later than 15th of May 2011<\/span><\/li>\n<li><span style=\"font-size:100%\">Notification date: around end May 2011<\/span><\/li>\n<li><span style=\"font-size:100%\">Full paper\/presentation submission: no later than 31th of July 2011<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family:courier new;font-size:100%\">Submissions can be entered at https:\/\/cfp.BruCON.org\/submission<\/p>\n<p>For further information and questions, please feel free to contact cfp 0x40 BruCON.org<br \/><\/span>  <span style=\"font-family:courier new\"><br \/>Submission Guideline (for standard paper track)<\/span> <span style=\"font-family:courier new\">==============================<\/span>================<br \/><span style=\"font-family:courier new\">Authors are encouraged to submit a paper in English or presentation slides, using a non-proprietary and open electronic format.<\/span>  <span style=\"font-family:courier new\">Abstract is up to 500 words. Submissions must be sent via <\/span>https:\/\/cfp.BruCON.org\/submission<span style=\"font-family:courier new\">.<\/span> <span style=\"font-family:courier new\">You can contact us if any errors or issues occur.<\/span>  <span style=\"font-family:courier new\">The program committee will review all papers and the author of each paper will be notified of the result, by electronic means.<\/span>  <span style=\"font-family:courier new\">Provide as much details about your talk as possible. It will enable reviewers who are not subject matter experts in the area that you focus on to still appreciate your abstract and make an informed decision when scoring it.<\/span>  <span style=\"font-family:courier new\">Submissions should also include the following:<\/span>  <span style=\"font-family:courier new\">1. Presenter, and geographical location (country of origin\/passport) and contact info.<\/span> <span style=\"font-family:courier new\">2. Brief biography, list of publications or papers.<\/span> <span style=\"font-family:courier new\">3. Any significant presentation and\/or educational experience\/background.<\/span> <span style=\"font-family:courier new\">4. Reason why this material is innovative or significant to the BruCON audience<\/span> <span style=\"font-family:courier new\">5. Optionally, any samples of prepared material or outlines ready.<\/span> <span style=\"font-family:courier new\">6. Information about if yes or no the submission has already been presented and where.<\/span>  <span style=\"font-family:courier new\">The information will be used only for the sole purpose of the BruCON conference including the information on the public website.<\/span>  <span style=\"font-family:courier new\">We  do not accept product or vendor related pitches. If your presentation  involves an advertisement for a new product or service your company is   offering, please do not submit. <\/span> <span style=\"font-family:courier new\">Also, we do not accept presentations submitted by a third party including (but not limited to) company representatives, management bureau&#8217;s, etc.<\/span>  <span style=\"font-family:courier new\">BruCON presentations should be focused  on topics that are of interest to security and technology professionals  who are paying attention to current trends and issues.<\/span>  <span style=\"font-family:courier new\">We want BruCON to be educational and entertaining to the attendees and the community.<\/span><br \/><span style=\"font-family:courier new\"><br \/>Additional Speakers Info<\/span><br \/><span style=\"font-family:courier new\">========================<br \/><\/span><span style=\"font-family:courier new\">BruCON  is a non-profit event organized by and for the security and hacking  community. Speakers are not paid. Financial help on travel expenses and accomodation is possible, but will be handled on a case-by-case basis.  Provide as much information about your requirements (including a cost estimation) and we will contact you personally after your talk has been accepted.  <\/span>  <span style=\"font-family:courier new\">Lectures should not exceed 45 minutes plus up  to 10 minutes for questions and answers. The spoken language of a  lecture will be English. <\/span>  <span style=\"font-family:courier new\"><\/p>\n<p>Publication and Rights<\/span><br \/><span style=\"font-family:courier new\">======================<br \/><\/span><span style=\"font-family:courier new\">Authors  keep the full rights on their publication\/papers but give the right to  redistribute their papers for the BruCON conference and the related  electronic\/paper publication under the <\/span><a style=\"font-family: courier new\" href=\"http:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/be\/deed.en\">CC-BY-NC-be<\/a><span style=\"font-family:courier new\"> license.<\/p>\n<p><\/span><span style=\"font-family:courier new\">Sponsoring and Donations<\/span><br \/><span style=\"font-family:courier new\">========================<br \/><\/span><span style=\"font-family:courier new\">If you want to support the initiative, please contact us by writing an e-mail to sponsors 0x40 BruCON.org<\/span><\/p>\n<p><span style=\"font-family:courier new;font-size:100%\">=================<br \/><\/span><span style=\"font-family:courier new\">The following resources are available to stay up to speed with the event:<\/span>  <span style=\"font-family:courier new\"><br \/><\/span><\/p>\n<ul>\n<li><span style=\"font-family:courier new\">BruCON website : <\/span><a style=\"font-family: courier new\" href=\"http:\/\/2010.brucon.org\/\">http:\/\/2011.brucon.org\/<\/a> <\/li>\n<li><span style=\"font-family:courier new\">BruCON on Twitter : <\/span><a style=\"font-family: courier new\" href=\"http:\/\/twitter.com\/brucon\" class=\"broken_link\" rel=\"nofollow\">http:\/\/twitter.com\/brucon<\/a> <\/li>\n<li><span style=\"font-family:courier new\">BruCON on LinkedIN : <\/span><a style=\"font-family: courier new\" href=\"http:\/\/www.linkedin.com\/groups?gid=1777141\">http:\/\/www.linkedin.com\/groups?gid=1777141<\/a><\/li>\n<li><span style=\"font-family:courier new\">BruCON Blog  : <\/span><a style=\"font-family: courier new\" href=\"http:\/\/blog.brucon.org\/\" class=\"broken_link\" rel=\"nofollow\">http:\/\/blog.brucon.org\/<\/a><\/li>\n<li><span style=\"font-family:courier new\">BruCON Mailinglist  :<\/span><span style=\"font-family:courier new;font-size:100%\"> <a href=\"http:\/\/mailman.brucon.org\/mailman\/listinfo\/brucon-announce\" class=\"broken_link\" rel=\"nofollow\">http:\/\/mailman.brucon.org\/mailman\/listinfo\/brucon-announce<\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers BruCON.v3 2011============================== Brussels, Belgium &#8212; This is the call for papers (CFP) and participation for the 3rd edition of BruCON, a 2-day Security and Hacking Conference full of interesting presentations, workshops and security challenges. BruCON is an open-minded gathering of people discussing computer security, privacy, and information technology. The conference tries to create bridges between the various actors active in computer security world including (but not limited to) hackers, security professionals, security&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-896","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts\/896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/comments?post=896"}],"version-history":[{"count":1,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts\/896\/revisions"}],"predecessor-version":[{"id":2118,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/posts\/896\/revisions\/2118"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/media?parent=896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/categories?post=896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2022\/wp-json\/wp\/v2\/tags?post=896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}