ETIC 2013 - Emerging Trends in Information and Communication Technologies Security
Topics/Call fo Papers
Elsevier (Morgan Kaufmann) Book
CALL FOR PAPERS
Submission Deadline: June 16, 2013
Title of Book:
Emerging Trends in Information and Communication
Technologies Security
Publication Date: September 2013
All accepted papers are subject to relevant Elsevier
Indexing (Elsevier indexing includes: Scopus, SCI
Compendex, Engineering Village, EMBASE, and others).
http://store.elsevier.com/Emerging-Trends-in-ICT-S...
http://store.elsevier.com/product.jsp?isbn=9780124...
================
INVITATION:
You are invited to submit a paper for consideration (see below for submission
instructions). All accepted papers will be published in the book entitled
"EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES SECURITY";
publisher: Elsevier (Morgan Kaufmann). All accepted papers are subject to
relevant Elsevier Indexing (Elsevier indexing includes: Scopus,
www.info.scopus.com; SCI Compendex, Engineering Village, www.ei.org; EMBASE,
www.info.embase.com; and others).
KEY FEATURES: this book will
O. Provide a multidisciplinary approach to security with coverage of
communication systems, information mining, policy making, and management
infrastructures.
O. Discuss deployment of numerous security solutions, including, cyber defense
techniques and defense against malicious code and mobile attacks.
O. Address application of security solutions in real-life scenarios in several
environments, such as social media, big data and crowd sourcing
DESCRIPTION:
EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT) SECURITY,
an edited book volume, discusses the foundations and theoretical aspects of
ICT security; covers trends, analytics, assessments and frameworks necessary
for performance analysis and evaluation; and provides the state-of-the-art
knowledge needed for successful deployment of security solutions in many
environments. Application scenarios will provide, with an insider's look,
security solutions deployed in real-life scenarios, including but not limited
to smart devices, biometrics, social media, big data security, and crowd
sourcing. The book is structured in four sections:
Part I: Foundations and theoretical aspects of ICT security
Part II: Trends, analytics, assessments and frameworks
Part III: Implementation and deployment
Part IV: Application Scenarios
RECOMMENDED TOPICS AND THEMES:
In the context of ICT and security, topics of interest include, but are not
limited to, the following:
Part I: Foundations and theoretical aspects of ICT security
This part will address the theories and concept which underpin various
aspect of ICT (information and communications technologies).
Part I core topics include:
-> Networks and security requirements
-> Information warfare
-> Privacy
-> Authentication, authorization and access
-> Cryptography, cryptosystems and watermarking
-> Cyber security management
-> Critical infrastructure
-> Policies
-> Intrusion detection systems
-> Security theories and practices for internet based solutions
-> Countering and reducing ICT security risks
-> Foundation of cloud security
-> Enterprise security modelling
PART II: Trends, analytics, assessments and frameworks
This part will address analytical and evaluative frameworks, tools and
concepts needed for understanding of security related issues in ICT
context.
Part II core Topics include:
-> Performance analysis and evaluation
-> Information assurances
-> System certification
-> Cyber security education
-> Mission assurance and critical infrastructure
-> Allied technologies
-> Legal and ethical frameworks
-> Security and threat assessment frameworks
Part III: Implementation and deployment
This part will address the realization of security concepts. It provides
the reader with the state of the art knowledge needed for successful
deployment of a security solution.
Part III core Topics include:
-> Management of infrastructures
-> Malicious code
-> Cyber defense deployment
-> Novel secrecy methods
-> Algorithms and applications (from Concept to Code)
-> e-Government security
-> Mobile security
-> Banking and financial sector
Part IV: Application scenarios
This part will address application of security solutions in real life
scenarios. Part IV core Topics include:
-> Smart devices security
-> Biometrics
-> Cyber Crime
-> Security best practices
-> Protection of critical infrastructure
-> Social Media Security
-> Cyber forensic
-> Big Data security concept
-> Crowd sourcing
-> User Perspective
IMPORTANT DATES:
June 16, 2013: Submission of papers/chapters for evaluation
July 1, 2013: Notification of acceptance/not-acceptance
July 12, 2013: Submission of typeset final papers/chapters for publication
+ signed Copyright Agreements
Sep/Oct, 2013: Publication of book.
SUBMISSION PROCEDURE:
Prospective authors are invited to submit their papers by uploading them to
the evaluation web site at:
http://world-comp.org/elsevier-morgan-kaufman-ICT/
Submissions must be uploaded by June 16, 2013 and must be in either MS doc
or pdf formats. All reasonable typesetting formats are acceptable: 11 to 12 as
font size, single line spacing (later, the authors of accepted papers will
be asked to follow a particular elsevier typesetting format to prepare their
final papers for publication.) Papers must not have been previously published
or currently submitted for publication elsewhere. The first page of the paper
should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name
of the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The first page should also include an
abstract of about 100 to 150 words. Each submission is anticipated to be
about 10 pages long (including: references, figures, tables, ...).
Each paper will be peer-reviewed by the editorial board for originality,
significance, clarity, impact, and soundness. Chief Editors will be advised
and supported by an International Editorial Advisory Board consisting of
leading specialized experts from the academia and industry.
The book will be published by Elsevier (Morgan Kaufmann) and so all
accepted papers will be subject to relevant Elsevier Indexing (Elsevier
indexing includes: Scopus, www.info.scopus.com; SCI Compendex, Engineering
Village, www.ei.org; EMBASE, www.info.embase.com; and others).
http://store.elsevier.com/product.jsp?isbn=9780124...
CO-EDITORS:
Babak Akhgar, FBCS
Professor of Informatics
Co-Director of CENTRIC
http://www.shu.ac.uk/research/c3ri/projects/babak-...
CENTRIC: http://research.shu.ac.uk/centric/
e-mail: b.akhgar-AT-shu.ac.uk
Hamid R. Arabnia, PhD., Fellow ISIBM
Professor of Computer Science
Editor-in-Chief, The Journal of Supercomputing (Springer)
Co-Editor/Board, Journal of Computational Science (Elsevier)
Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM)
http://www.cs.uga.edu/~hra/
email: hra-AT-cs.uga.edu
CONTACT:
Inquiries should be sent to: elsevier-ed-AT-world-comp.org
CALL FOR PAPERS
Submission Deadline: June 16, 2013
Title of Book:
Emerging Trends in Information and Communication
Technologies Security
Publication Date: September 2013
All accepted papers are subject to relevant Elsevier
Indexing (Elsevier indexing includes: Scopus, SCI
Compendex, Engineering Village, EMBASE, and others).
http://store.elsevier.com/Emerging-Trends-in-ICT-S...
http://store.elsevier.com/product.jsp?isbn=9780124...
================
INVITATION:
You are invited to submit a paper for consideration (see below for submission
instructions). All accepted papers will be published in the book entitled
"EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES SECURITY";
publisher: Elsevier (Morgan Kaufmann). All accepted papers are subject to
relevant Elsevier Indexing (Elsevier indexing includes: Scopus,
www.info.scopus.com; SCI Compendex, Engineering Village, www.ei.org; EMBASE,
www.info.embase.com; and others).
KEY FEATURES: this book will
O. Provide a multidisciplinary approach to security with coverage of
communication systems, information mining, policy making, and management
infrastructures.
O. Discuss deployment of numerous security solutions, including, cyber defense
techniques and defense against malicious code and mobile attacks.
O. Address application of security solutions in real-life scenarios in several
environments, such as social media, big data and crowd sourcing
DESCRIPTION:
EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT) SECURITY,
an edited book volume, discusses the foundations and theoretical aspects of
ICT security; covers trends, analytics, assessments and frameworks necessary
for performance analysis and evaluation; and provides the state-of-the-art
knowledge needed for successful deployment of security solutions in many
environments. Application scenarios will provide, with an insider's look,
security solutions deployed in real-life scenarios, including but not limited
to smart devices, biometrics, social media, big data security, and crowd
sourcing. The book is structured in four sections:
Part I: Foundations and theoretical aspects of ICT security
Part II: Trends, analytics, assessments and frameworks
Part III: Implementation and deployment
Part IV: Application Scenarios
RECOMMENDED TOPICS AND THEMES:
In the context of ICT and security, topics of interest include, but are not
limited to, the following:
Part I: Foundations and theoretical aspects of ICT security
This part will address the theories and concept which underpin various
aspect of ICT (information and communications technologies).
Part I core topics include:
-> Networks and security requirements
-> Information warfare
-> Privacy
-> Authentication, authorization and access
-> Cryptography, cryptosystems and watermarking
-> Cyber security management
-> Critical infrastructure
-> Policies
-> Intrusion detection systems
-> Security theories and practices for internet based solutions
-> Countering and reducing ICT security risks
-> Foundation of cloud security
-> Enterprise security modelling
PART II: Trends, analytics, assessments and frameworks
This part will address analytical and evaluative frameworks, tools and
concepts needed for understanding of security related issues in ICT
context.
Part II core Topics include:
-> Performance analysis and evaluation
-> Information assurances
-> System certification
-> Cyber security education
-> Mission assurance and critical infrastructure
-> Allied technologies
-> Legal and ethical frameworks
-> Security and threat assessment frameworks
Part III: Implementation and deployment
This part will address the realization of security concepts. It provides
the reader with the state of the art knowledge needed for successful
deployment of a security solution.
Part III core Topics include:
-> Management of infrastructures
-> Malicious code
-> Cyber defense deployment
-> Novel secrecy methods
-> Algorithms and applications (from Concept to Code)
-> e-Government security
-> Mobile security
-> Banking and financial sector
Part IV: Application scenarios
This part will address application of security solutions in real life
scenarios. Part IV core Topics include:
-> Smart devices security
-> Biometrics
-> Cyber Crime
-> Security best practices
-> Protection of critical infrastructure
-> Social Media Security
-> Cyber forensic
-> Big Data security concept
-> Crowd sourcing
-> User Perspective
IMPORTANT DATES:
June 16, 2013: Submission of papers/chapters for evaluation
July 1, 2013: Notification of acceptance/not-acceptance
July 12, 2013: Submission of typeset final papers/chapters for publication
+ signed Copyright Agreements
Sep/Oct, 2013: Publication of book.
SUBMISSION PROCEDURE:
Prospective authors are invited to submit their papers by uploading them to
the evaluation web site at:
http://world-comp.org/elsevier-morgan-kaufman-ICT/
Submissions must be uploaded by June 16, 2013 and must be in either MS doc
or pdf formats. All reasonable typesetting formats are acceptable: 11 to 12 as
font size, single line spacing (later, the authors of accepted papers will
be asked to follow a particular elsevier typesetting format to prepare their
final papers for publication.) Papers must not have been previously published
or currently submitted for publication elsewhere. The first page of the paper
should include: title of the paper, name, affiliation, postal address, and
email address for each author. The first page should also identify the name
of the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The first page should also include an
abstract of about 100 to 150 words. Each submission is anticipated to be
about 10 pages long (including: references, figures, tables, ...).
Each paper will be peer-reviewed by the editorial board for originality,
significance, clarity, impact, and soundness. Chief Editors will be advised
and supported by an International Editorial Advisory Board consisting of
leading specialized experts from the academia and industry.
The book will be published by Elsevier (Morgan Kaufmann) and so all
accepted papers will be subject to relevant Elsevier Indexing (Elsevier
indexing includes: Scopus, www.info.scopus.com; SCI Compendex, Engineering
Village, www.ei.org; EMBASE, www.info.embase.com; and others).
http://store.elsevier.com/product.jsp?isbn=9780124...
CO-EDITORS:
Babak Akhgar, FBCS
Professor of Informatics
Co-Director of CENTRIC
http://www.shu.ac.uk/research/c3ri/projects/babak-...
CENTRIC: http://research.shu.ac.uk/centric/
e-mail: b.akhgar-AT-shu.ac.uk
Hamid R. Arabnia, PhD., Fellow ISIBM
Professor of Computer Science
Editor-in-Chief, The Journal of Supercomputing (Springer)
Co-Editor/Board, Journal of Computational Science (Elsevier)
Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM)
http://www.cs.uga.edu/~hra/
email: hra-AT-cs.uga.edu
CONTACT:
Inquiries should be sent to: elsevier-ed-AT-world-comp.org
Other CFPs
Last modified: 2013-05-29 07:25:52