<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<meta name=Generator content="Microsoft Word 12 (filtered medium)">
<style>
<!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri","sans-serif";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;}
@page Section1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.Section1
{page:Section1;}
/* List Definitions */
@list l0
{mso-list-id:1742482261;
mso-list-template-ids:1262410940;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:36.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-tab-stop:72.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level3
{mso-level-tab-stop:108.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level4
{mso-level-tab-stop:144.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level5
{mso-level-tab-stop:180.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level6
{mso-level-tab-stop:216.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level7
{mso-level-tab-stop:252.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level8
{mso-level-tab-stop:288.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
@list l0:level9
{mso-level-tab-stop:324.0pt;
mso-level-number-position:left;
text-indent:-18.0pt;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
-->
</style>
<!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=EN-GB link=blue vlink=purple>
<div class=Section1>
<p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:12.0pt;
color:black'>Hello <o:p></o:p></span></p>
<p class=MsoNormal style='margin-top:11.25pt;mso-margin-bottom-alt:auto'><b><span
style='font-size:12.0pt'>This is a <span style='color:red'>Final call</span>
for papers for the </span></b><b><span style='font-size:12.0pt'>13th European
Conference on Cyber Warfare and Security ECCWS-2014, (formally the European
Conference on Information Warfare and Security) being hosted by The University
of Piraeus, Greece on the 3-4 July 2014.<o:p></o:p></span></b></p>
<p class=MsoNormal style='margin-top:11.25pt;mso-margin-bottom-alt:auto'><span
style='font-size:12.0pt;color:black'>This call will </span><b><span
style='font-size:12.0pt;color:red'>close</span></b><span style='font-size:12.0pt;
color:black'> on <b>12<sup>th</sup> of December 2013.<o:p></o:p></b></span></p>
<p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:12.0pt;
color:black'>The 13th European Conference on Cyber Warfare and Security (ECCWS)
is an opportunity for academics, practitioners and consultants from Europe and
elsewhere who are involved in the study, management, development and
implementation of systems and concepts to combat cyber warfare or to improve
information systems security to come together and exchange ideas. There are
several strong strands of research and interest that are developing in the area
including the understanding of threats and risks to information systems, the
development of a strong security culture, as well as incident detection and
post incident investigation. This conference is continuing to establish itself
as a key event for individuals working in the field from around the world. <o:p></o:p></span></p>
<p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:12.0pt;
color:black'>For more information, please go to </span><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm">http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm</a><o:p></o:p></p>
<p class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span
style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'>In
addition to the main conference topics, the advisory group invites suggestions
to the following mini tracks. </span><o:p></o:p></p>
<ul type=disc>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Abouzakhar">Critical
Infrastructure Protection</a></span></b><span style='font-size:10.0pt;
font-family:"Arial","sans-serif"'> chaired by <b><i>Dr. Nasser Abouzakhar,</i></b>
University of Hertfordshire, UK </span><o:p></o:p></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Koltuksuz">Cyber
Intelligence - Cyber Counterintelligence</a></span></b><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'> chaired by <b><i>Dr
Ahmet Koltuksuz</i></b>, Yasar University , Turkey</span><o:p></o:p></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Jeswal">PsyOPS</a></span></b><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'> chaired by <b><i>Dr.
Rupali Jeswal</i></b>, Xiphos-ISS (Intelligence & Security Solutions)</span><o:p></o:p></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Tekir">Data
Mining and Data Fusion Applications</a></span></b><span style='font-size:
10.0pt;font-family:"Arial","sans-serif"'> chaired by </span><span lang=PT
style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Asst Prof <b><i>Dr
Selma Tekir</i></b>, </span><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'>Izmir Institute of Technology, </span><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Turkey</span><o:p></o:p></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Sahin">Malware
and Antimalware Technologies and Digital Forensics</a></span></b><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'> chaired by </span><span
lang=PT style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Asst.
Prof. <b><i>Dr. Serap Sahin</i></b>,</span><span lang=PT style='font-size:
10.0pt;font-family:"Arial","sans-serif"'> </span><span style='font-size:
10.0pt;font-family:"Arial","sans-serif"'>Izmir Institute of Technology</span><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'>, Turkey</span><o:p></o:p></li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo1'><b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'><a
href="http://academic-conferences.org/eccws/eccws2014/eccws14-call-papers.htm#Lehto">Cyber
Security Education</a></span></b><span style='font-size:10.0pt;font-family:
"Arial","sans-serif"'> chaired by </span><b><i><span lang=PT
style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Dr Martti Lehto</span></i></b><span
lang=PT style='font-size:10.0pt;font-family:"Arial","sans-serif"'>, </span><span
style='font-size:10.0pt;font-family:"Arial","sans-serif"'>University of
Jyväskylä, Finland</span><o:p></o:p></li>
</ul>
<p class=MsoNormal><span style='font-size:12.0pt;color:black'><o:p> </o:p></span></p>
<p class=MsoNormal><b><span style='font-size:12.0pt'>Academic research, case
studies and work-in-progress/posters are welcomed approaches. PhD Research,
proposals for roundtable discussions, non-academic contributions and product
demonstrations based on the main themes are also invited.</span></b><span
style='font-size:12.0pt;color:black'> </span><b><span style='font-size:12.0pt;
color:red'>Please feel free to circulate this message to any colleagues or
contacts you think may be interested.</span></b><span style='font-size:12.0pt;
color:black'><o:p></o:p></span></p>
<p class=MsoNormal style='margin-bottom:12.0pt;text-align:justify'><span
style='font-size:12.0pt;color:black'>Selected papers that have been presented
at the Conference will be considered for publication in special issues of both
the<b> Journal of Information Warfare</b>: <a href="http://www.jinfowar.com">http://www.jinfowar.com</a>
and the <b>International Journal of Cyber Warfare and Terrorism</b> (IJCWT)
published by Information Resources Management Association, USA. (DOI:
10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected
papers from the conference will be considered for publication in the <b>International
Journal of Electronic Security and Digital Forensics</b> published by
Inderscience UK (ISSN:1751-1911X)<o:p></o:p></span></p>
<p class=MsoNormal style='margin-bottom:12.0pt;text-align:justify'><b><i><span
style='font-size:12.0pt;color:#1F497D'>The Proceedings have an ISSN, ISBN and
will be submitted for indexing in the Thompson Web of Science and Scopus and
they are listed in the EBSCO database.</span></i></b><b><i><span
style='font-size:12.0pt;color:black'><o:p></o:p></span></i></b></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:black'>Kind regards<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:black'><o:p> </o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:black'><o:p> </o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:black'>Sue Nugus<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:#1F497D'>Conferences
Director<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt'><a
href="http://111.academic-conferences.org/">http://www.academic-conferences.org</a><span
style='color:#1F497D'><o:p></o:p></span></span></p>
<p class=MsoNormal><span style='font-size:12.0pt'><a
href="mailto:sue@academic-conferences.org">sue@academic-conferences.org</a><span
style='color:#1F497D'><o:p></o:p></span></span></p>
<p class=MsoNormal><span style='font-size:12.0pt;color:#1F497D'>Tel: +44 (0)
118 972 4148<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-size:12.0pt'><a
href="https://twitter.com/#!/suenugus">Follow me on Twitter</a><span
style='color:#1F497D'><o:p></o:p></span></span></p>
<p class=MsoNormal><span style='font-size:12.0pt'><a
href="http://uk.linkedin.com/pub/sue-nugus/7/616/1b4">Connect with me on
LinkedIn</a><span style='color:#1F497D'><o:p></o:p></span></span></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
<p class=MsoNormal><o:p> </o:p></p>
</div>
<br clear="both">
________________________________________________________________________<BR>
This e-mail has been scanned for all viruses by Claranet. The<BR>
service is powered by MessageLabs. For more information on a proactive<BR>
anti-virus service working around the clock, around the globe, visit:<BR>
http://www.claranet.co.uk<BR>
________________________________________________________________________<BR>
</body>
</html>