FGCS 2013 - Future Generation Computer Systems (FGCS) Special Issue on "Behavior Data Security Issues in Network Information Propagation"
Topics/Call fo Papers
FGCS Special Issue Call for Papers (Due on March 15, 2013)
Future Generation Computer Systems (FGCS) Special Issue on
"Behavior Data Security Issues in Network Information Propagation"
URL: http://www.tulip.org.au/research/fgcs2013si
URL: http://www.journals.elsevier.com/future-generation...
==========================
Important Dates
==========================
Submission due date: March 15, 2013
First Round Review notification: June 15, 2013
Revision Submission due date: July 30, 2013
Notification of acceptance: September 15, 2013
Camera Ready submission due date: September 30, 2013
Publication: Fourth quarter of 2013 (tentative)
==========================
Scope and Objective
==========================
The rapid development of data collection and network communication technology has led the "information age" towards a new and exciting stage. With the dramatic increase of network information resources, re-searchers and practitioners from more diverse disciplines than ever before are confronted with issues such as how to make secure and effective interactions among various resources. For example, Google Map suc-cessfully connects and integrates multiple resources such as traffic, accommodations etc. Actually most network applications are involved with an interaction among resources, and the underlying data exchange forms a detailed map of information propagation.
Recently, the security issue of information propagation attracts significant research interest, and much work on security-related protection and evaluation have been proposed. There are mainly two factors influencing the security: one is from the network characteristics (e.g. the packet loss) and the protocol flaw (e.g. DNS); while the other one comes from user behaviors, which can be further classified as malicious behavior and normal behavior. To study these complex behaviors, behavior analysis has been discussed by computer scientists, psychology and ethic researchers in recent years. More specially, behavior analysis arises as an inter-disciplinary domain including Behavior Representation, Modeling, Analysis and Management, which aims to develop techniques and practical tools for describing behaviors via formal representation and quan-titative analysis. Actually, user behavior has great relevance to security. Studying security issues from the perspective of user behavior, indicates the timely need of
developing advanced, formal and general method-ologies and techniques for network information propagation.
This FGCS special issue aims to foster Behavior Data Security through high quality research in methods, theo-ries, techniques and tools for advancing the network information propagation. In particular, this special issue will discuss the most recent research in the behavior analysis and security-related technologies of any net-work applications. Original research articles are solicited in all aspects of including theoretical studies, practical applications, new communication technology and experimental prototypes. All submitted papers will be peer-reviewed and selected on the basis of both their quality and their relevance to the theme of this special issue.
==========================
Topics of Interest
==========================
This special issue calls for original papers describing the latest developments, trends, and solutions of Behavior Data Security for network information propagation. This special issue will focus on but not limited to the following topics:
Access control and authentication
Behavior Mining and Analysis
Computer forensics
Information assurance
Network recovery
Network security management
Network survivability
Malicious software
Privacy-preserving secure protocols
Secure communication
Secure network protocols
Context-Aware interactions
Content and service delivery
Security Systems & Services
Wireless network security
Mobile Network security
==========================
Paper Submissions
==========================
Prospective authors are invited to submit their papers directly via the FGCS submission web site at http://ees.elsevier.com/fgcs/login.asp
(please select the item SI: Behavior Data Security).
Each paper for submission should be formatted according to the style and length limit of the Future Generation Computer Systems. Papers must not have appeared or under review elsewhere. Please refer to the complete Author Guidelines at http://www.journals.elsevier.com/future-generation...
==========================
Guest Editors
==========================
Dr. Gang Li,
Deakin University, Australia (gang.li-AT-deakin.edu.au)
Dr. Wenjia Niu
Chinese Academy of Sciences, China (niuwj-AT-hpnl.ac.cn)
Prof. Lynn Batten
Deakin University, Australia (lynn.batten-AT-deakin.edu.au)
Future Generation Computer Systems (FGCS) Special Issue on
"Behavior Data Security Issues in Network Information Propagation"
URL: http://www.tulip.org.au/research/fgcs2013si
URL: http://www.journals.elsevier.com/future-generation...
==========================
Important Dates
==========================
Submission due date: March 15, 2013
First Round Review notification: June 15, 2013
Revision Submission due date: July 30, 2013
Notification of acceptance: September 15, 2013
Camera Ready submission due date: September 30, 2013
Publication: Fourth quarter of 2013 (tentative)
==========================
Scope and Objective
==========================
The rapid development of data collection and network communication technology has led the "information age" towards a new and exciting stage. With the dramatic increase of network information resources, re-searchers and practitioners from more diverse disciplines than ever before are confronted with issues such as how to make secure and effective interactions among various resources. For example, Google Map suc-cessfully connects and integrates multiple resources such as traffic, accommodations etc. Actually most network applications are involved with an interaction among resources, and the underlying data exchange forms a detailed map of information propagation.
Recently, the security issue of information propagation attracts significant research interest, and much work on security-related protection and evaluation have been proposed. There are mainly two factors influencing the security: one is from the network characteristics (e.g. the packet loss) and the protocol flaw (e.g. DNS); while the other one comes from user behaviors, which can be further classified as malicious behavior and normal behavior. To study these complex behaviors, behavior analysis has been discussed by computer scientists, psychology and ethic researchers in recent years. More specially, behavior analysis arises as an inter-disciplinary domain including Behavior Representation, Modeling, Analysis and Management, which aims to develop techniques and practical tools for describing behaviors via formal representation and quan-titative analysis. Actually, user behavior has great relevance to security. Studying security issues from the perspective of user behavior, indicates the timely need of
developing advanced, formal and general method-ologies and techniques for network information propagation.
This FGCS special issue aims to foster Behavior Data Security through high quality research in methods, theo-ries, techniques and tools for advancing the network information propagation. In particular, this special issue will discuss the most recent research in the behavior analysis and security-related technologies of any net-work applications. Original research articles are solicited in all aspects of including theoretical studies, practical applications, new communication technology and experimental prototypes. All submitted papers will be peer-reviewed and selected on the basis of both their quality and their relevance to the theme of this special issue.
==========================
Topics of Interest
==========================
This special issue calls for original papers describing the latest developments, trends, and solutions of Behavior Data Security for network information propagation. This special issue will focus on but not limited to the following topics:
Access control and authentication
Behavior Mining and Analysis
Computer forensics
Information assurance
Network recovery
Network security management
Network survivability
Malicious software
Privacy-preserving secure protocols
Secure communication
Secure network protocols
Context-Aware interactions
Content and service delivery
Security Systems & Services
Wireless network security
Mobile Network security
==========================
Paper Submissions
==========================
Prospective authors are invited to submit their papers directly via the FGCS submission web site at http://ees.elsevier.com/fgcs/login.asp
(please select the item SI: Behavior Data Security).
Each paper for submission should be formatted according to the style and length limit of the Future Generation Computer Systems. Papers must not have appeared or under review elsewhere. Please refer to the complete Author Guidelines at http://www.journals.elsevier.com/future-generation...
==========================
Guest Editors
==========================
Dr. Gang Li,
Deakin University, Australia (gang.li-AT-deakin.edu.au)
Dr. Wenjia Niu
Chinese Academy of Sciences, China (niuwj-AT-hpnl.ac.cn)
Prof. Lynn Batten
Deakin University, Australia (lynn.batten-AT-deakin.edu.au)
Other CFPs
- 29th International Conference on Logic Programming
- The Second International Workshop on Information Theory (WIT-2013)
- International Conference on Mechanical, Automotive and Materials Engineering (CMAME 2013)
- 2013 3rd International Conference on Management and Artificial Intelligence
- 2013 2nd International Conference on Electronics Engineering and Informatics
Last modified: 2013-01-14 15:31:49