The First International Workshop on Cyber-Fraud


July 1-6, 2007 - Silicon Valley, USA

Technical Co-Sponsors and Logistics Supporters

This workshop is part of ICIMP 2007.

Submit a Paper:

Submit a paper using the same page as the ICIMP 2007 conference.

Touristic Information:

Touristic information is available from the hosting conference, ICIMP 2007.

Hotels and Travel:

Hotels and travel information is available from the hosting conference page, ICIMP 2007.

Call for Papers:

Attacks against private and public networks have had a significant spreading in the last years. With simple or sophisticated behavior, the attacks tend to damage user confidence, cause huge privacy violations and enormous economic losses.

The International Workshop on Cyber-Fraud, CYBER-FRAUD 2007, focuses on specific aspects related to attacks and counterattacks, public information, privacy and safety on cyber-attacks information.  It also targets secure mechanisms to record, retrieve, share, interpret, prevent and post-analyze of cyber-crime attacks.

This workshop will provide a forum for interaction among researchers and practitioners working in the area of cyber attacks. We solicit papers dealing with all aspects of any kind of studies, experiences, previsions, comparisons, privacy and economic impacts, and existing technical supports for cyber-attacks.  

TOPICS OF SPECIAL INTEREST (but not limited to):

  1. Epidemiological models for warware and cyber-crime propagation
  2. Record and retrieval of cyber-crimes
  3. Forensic analysis
  4. Cyber-crime prevention
  5. Cyber-crime vulnerabilities
  6. Cyber-counterattack at source
  7. Distributed cyber-attacks
  8. Orchestrated cyber-attacks
  9. Recursion attacks
  10. Cyber-storm attacks
  11. Spyware and malware
  12. Cyber-pranks, hoaxes
  13. Phishing/Pharming and anti-phishing
  14. Cyber-terrorism,
  15. Online cyber-crime reporting
  16. Accuracy and security of cyber-reports
  17. Fighting cyber-crimes
  18. Cyber-crime laws


The CYBER-FRAUD 2007 Proceedings will be published by IEEE Computer Society Conference Publishing Services, posted on IEEE Xplore Digital Library, and indexed with major indexes.

Important deadlines:

Submission deadline March 4, 2007
Notification April 7, 2007
Registration and camera ready April 20, 2007

Only .pdf or .doc files will be accepted for paper submission. All received papers will be acknowledged via the EDAS system.

Final author manuscripts will be 8.5" x 11" (two columns IEEE format), not exceeding 6 pages; max 4 extra pages allowed at additional cost. The formatting instructions can be found on the Instructions page.

Once you receive the notification of paper acceptance, you will be provided by the IEEE CS Press an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

Technical marketing/business/positioning presentations

The conference initiates a series of business, technical marketing, and positioning presentations on the same topics. Speakers must submit a 10-12 slide deck presentations with substantial notes accompanying the slides, in the .ppt format (.pdf-ed). The slide deck will be published in the conference’s CD collection, together with the regular papers. Please send your presentations to


Tutorials provide overviews of current high interest topics. Proposals can be for half or full day tutorials. Please send your proposals to

Panel proposals

The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. Please send your proposals to


Tom Chen, Southern Methodist University - Dallas, USA
Radu State, LORIA, France

TPC Members:

Philippe Biondi, SecDev-Computer Security/R&D, USA
Feng Cao, Cisco, USA
Isabelle Chrisment, Universite Henri Poincare, France
Tom Chen, Southern Methodist University - Dallas, USA
Petre Dini, Cisco,  USA // Concordia University, Canada
Eric Filiol, ESAT, France
Nicolas Fischbach, COLT Telecom, France
Markus Jacobsson, Indiana University - Bloomington, USA
Seny Kamara, Johns Hopkins University, USA
Rembrandt Klopper, University of KwaZulu-Natal, South Africa
Sam Lubbe, University of South Africa, South Africa
Deapesh Misra, Verisign-iDefense, USA
Saverio Niccolini, NEC Europe Ltd., Germany
Giorgio Nunzi, Network Laboratories, NEC Europe Ltd., Germany 
Radu State, LORIA, France
Shyaam Sundhar R. S., Endeavor Security Inc. McLean, USA
Lisa Thalheim, Humboldt University Berlin, Germany


Tutorials are available from the hosting conference page, ICIMP 2007.

Preliminary Program:

Preliminary program is available from the hosting conference page, ICIMP 2007.

Manuscript Preparation:

Manuscript preparation is available from the hosting conference page, ICIMP 2007.

Registration Form:

Registration form is available from the hosting conference page, ICIMP 2007.


Statistics are available from the hosting conference page, ICIMP 2007.


Photos are available from the hosting conference page, ICIMP 2007.


Awards are available from the hosting conference page, ICIMP 2007.


Copyright (c) 2006, IARIA