BICCS 2013 - Call for Book Chapters Bio-Inspired Computing in Cyber Security
Topics/Call fo Papers
Call for Book Chapters
Bio-Inspired Computing in Cyber Security
Aim and Scope
Recently, and due to the large diversity of the hackers and attacks, information security algorithms and application have become a crucial need for protecting almost all information transaction applications. Cyber security is an important branch of information security that is applied in computers and networks. This book cover the cyber security branch, and aims to ensemble the up-to-date advances of various topics in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in the real-world scenarios. Chapters and studies which couple the intelligence systems and theories with specific cyber security-related problems are cordially invited. Survey articles that emphasize the research and application of cyber security are greatly welcome. The primary target audience for the book includes researchers, scholars, postgraduate students and developers who are interested in cyber security research and related issues. The book will provide reviews of the cutting?edge technologies, algorithms, applications and insights for cyber security -based systems. In particular, the book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber Security. The book will be organized in self-contained chapters to provide greatest reading flexibility.
Topics of interest include, but are not limited to:
Intrusion Detection Systems
Assured Information Sharing
Privacy and Freedom of Expression in Cyberspace
Computer Crimes and Digital Forensic
Biometric Technology
Wireless Security
Processing of Big Cyber Security Data
Cloud Security
Cryptography and Cryptanalysis
Web Security and Attack Graph
Steganography and Watermarking
Security, Trust, and privacy in High Interest Applications
Parallel Processing and Time Efficient Computing
Multi-Net Security and Wireless Security
Graphic Processing Unit (GPU), and its Security Applications
Alert Correlations
Multimedia security
Social security
Data Mining for Cyber security
Intelligent Cyber Security Analysis in Enterprise Networks
Anti-disaster applications of immune computing/ Autonomic Networking
Publication Schedule
The tentative schedule of the book publication is as follows:
Deadline for paper submission: September 15, 2013
First round notification : October 15, 2013
Camera-ready submission: November 1, 2013
Publication date: December, 2013
Chapter Submission
Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, Word is not accepted, and according to the Springer's svmlt template that can be downloaded from the (link). Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should send their manuscripts electronically to the following email addresses: (aawad-AT-ieee.org), with cc-ing to (aboitcairo-AT-gmail.com), with the subject title as: "Bio-Inspired Computing in Cyber Security - Book Chapter" in PDF. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published in Intelligent Systems Reference Library by Springer. More information about Intelligent Systems Reference Library can be found (here).
Book Editors
Aboul-Ella Hassanien
Faculty of Computers & Information
Cairo University, Egypt
E-mail: aboitcairo-AT-gmail.com
Tai-hoon Kim
Multimedia Control and Assurance Laboratory
Hannam University, Korea
E-mail: taihoonn-AT-empal.com
Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland
E-mail: Janusz.Kacprzyk-AT-ibspan.waw.pl
Ali Ismail Awad (Corresponding Editor)
Faculty of Engineering
Al Azhar University, Qena, Egypt
E-mail: aawad-AT-ieee.org
Bio-Inspired Computing in Cyber Security
Aim and Scope
Recently, and due to the large diversity of the hackers and attacks, information security algorithms and application have become a crucial need for protecting almost all information transaction applications. Cyber security is an important branch of information security that is applied in computers and networks. This book cover the cyber security branch, and aims to ensemble the up-to-date advances of various topics in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in the real-world scenarios. Chapters and studies which couple the intelligence systems and theories with specific cyber security-related problems are cordially invited. Survey articles that emphasize the research and application of cyber security are greatly welcome. The primary target audience for the book includes researchers, scholars, postgraduate students and developers who are interested in cyber security research and related issues. The book will provide reviews of the cutting?edge technologies, algorithms, applications and insights for cyber security -based systems. In particular, the book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber Security. The book will be organized in self-contained chapters to provide greatest reading flexibility.
Topics of interest include, but are not limited to:
Intrusion Detection Systems
Assured Information Sharing
Privacy and Freedom of Expression in Cyberspace
Computer Crimes and Digital Forensic
Biometric Technology
Wireless Security
Processing of Big Cyber Security Data
Cloud Security
Cryptography and Cryptanalysis
Web Security and Attack Graph
Steganography and Watermarking
Security, Trust, and privacy in High Interest Applications
Parallel Processing and Time Efficient Computing
Multi-Net Security and Wireless Security
Graphic Processing Unit (GPU), and its Security Applications
Alert Correlations
Multimedia security
Social security
Data Mining for Cyber security
Intelligent Cyber Security Analysis in Enterprise Networks
Anti-disaster applications of immune computing/ Autonomic Networking
Publication Schedule
The tentative schedule of the book publication is as follows:
Deadline for paper submission: September 15, 2013
First round notification : October 15, 2013
Camera-ready submission: November 1, 2013
Publication date: December, 2013
Chapter Submission
Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, Word is not accepted, and according to the Springer's svmlt template that can be downloaded from the (link). Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should send their manuscripts electronically to the following email addresses: (aawad-AT-ieee.org), with cc-ing to (aboitcairo-AT-gmail.com), with the subject title as: "Bio-Inspired Computing in Cyber Security - Book Chapter" in PDF. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published in Intelligent Systems Reference Library by Springer. More information about Intelligent Systems Reference Library can be found (here).
Book Editors
Aboul-Ella Hassanien
Faculty of Computers & Information
Cairo University, Egypt
E-mail: aboitcairo-AT-gmail.com
Tai-hoon Kim
Multimedia Control and Assurance Laboratory
Hannam University, Korea
E-mail: taihoonn-AT-empal.com
Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland
E-mail: Janusz.Kacprzyk-AT-ibspan.waw.pl
Ali Ismail Awad (Corresponding Editor)
Faculty of Engineering
Al Azhar University, Qena, Egypt
E-mail: aawad-AT-ieee.org
Other CFPs
- Audio Engineering Society 53rd conference on Semantic Audio
- 10th International Conference on Information Security Practice and Experience (ISPEC 2014)
- International Conference on Mechanical Engineering
- Developing and Implementing an Export Management & Compliance System
- 2013 The 2nd International Conference on Industrial Design and Mechanics Power (ICIDMP2013)
Last modified: 2013-06-28 23:40:39