The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICMSH 2022: 16. International Conference on Malicious Software and Hacking
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Malicious Software and Hacking.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Malicious Software and Hacking
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Malicious Software and Hacking are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICMSH 2022 has teamed up with the Special Journal Issue on
Malicious Software and Hacking.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Malware Detection in Mobile Devices by Analyzing Sequences of System Calls
Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
-
Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Andrii Shalaginov, Katrin Franke, Xiongwei Huang
-
Suggestion for Malware Detection Agent Considering Network Environment
Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung
-
Automatic Intelligent Analysis of Malware Behaviour
H. Dornhackl, K. Kadletz, R. Luh, P. Tavolato
-
An Efficient Framework to Build Up Malware Dataset
Madihah Mohd Saudi, Zul Hilmi Abdullah
-
Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Naveed Ghani, Samreen Javed
-
Study on Network-Based Technology for Detecting Potentially Malicious Websites
Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
-
Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment
Zulkiflee M., Robiah Y., Nur Azman Abu, Shahrin S.
-
Protocol and Method for Preventing Attacks from the Web
Ryuya Uda
-
Propagation Model for a Mass-Mailing Worm with Mailing List
Akira Kanaoka, Eiji Okamoto
Malicious software
Targeted attacks
Smartphone malware
Analysis and measurements of real malware incidents
Worms, viruses and other propagating malware
Spyware, keystroke loggers, information theft malware
Honeypots and other sample collection methodologies
Botnet attacks, detection/tracking and defense
Malware economics and black market studies
Code reverse engineering tools and practices
Malware performance, analysis and capture tools
Anti-spam and anti-phishing techniques and practices
Legal aspects of unwanted software use
Malware and its impact in social networking and cloud computing
Rootkit and virtualization techniques
Malware in wireless mobile devices
Abstracts/Full-Text Paper Submission Deadline |
|
March 16, 2021 |
Notification of Acceptance/Rejection |
|
April 01, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
May 20, 2022 |
Conference Dates |
|
June 21-22, 2022 |
Wei Yan |
Trend Micro Inc, US |
Balaganesh Duraisamy |
Lincoln University College, MY |
Babak Bashari Rad |
Asia Pacific University of Technology and Innovation, MY |
Madihah Mohd Saudi |
Universiti Sains Islam Malaysia(USIM), MY |
Murugan sethuraman muru |
alagappa university, IN |
Manoj Singh Gaur |
Malaviya National Institute of Technology, IN |
Participation Type |
Early Registration Ticket Fees |
Registration Ticket Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2022-05-20 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.