ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CPS 2016 - IEEE Computer SI on "Communications and Privacy Surveillance"

Date2016-03-31

Deadline2015-08-01

VenueOnline, Online Online

Keywords

Website

Topics/Call fo Papers

IEEE Computer
Special Issue on "Communications and Privacy under Surveillance"
Full paper submission deadline: 1 August 2015
Publication date: March 2016
Computer plans a March 2016 special issue on communications and privacy under
surveillance.
Today, our daily communications are subject to surveillance by government
agencies and private hackers. The purpose could be legal crime investigation
or terrorism prevention, or it could be illegal privacy infringement or theft
of confidential information. There are often gray areas between legal and
illegal surveillance.
Despite the controversy, communications-surveillance technologies continue to
evolve. However, these sensitive technologies have seldom been reported in the
scientific literature, as developers have largely subscribed to the idea of
"security by obscurity." Now, though, many realize that surveillance
technologies could be improved much faster via "security by clarity," with the
technologies examined by both good and bad guys. This could also reduce the
gray area between legal and illegal activities, thereby protecting privacy.
This special issue will foster dissemination of the latest communications and
privacy surveillance methodologies. The guest editors’ aim is to publish high-
quality articles presenting the state of the art in lawful, mass, wireless,
and backdoor surveillance. Appropriate topics include, but are not limited to,
the following:
a.. Lawful surveillance with RFC 3924
b.. Mass and global surveillance programs such as Five Eyes, PRISM,
XKeyscore, Tempora, Muscular, and Royal Concierge
c.. Wireless surveillance via 4G/3G/GSM, Wi-Fi, and Bluetooth with IMSI
Catcher, Femtocatch, and Bluejacking
d.. Backdoor surveillance by malware on servers, desktops, laptops,
smartphones, and tablets via server and browser exploits, repackaged
applications, repackaged documents, and advanced persistent threats
e.. Surveillance and analysis tools such as Boundless Informant, XKeyscore,
Tempora, Tracfin, Visitor Location Registers, A5/1, and Tor
f.. Big data analysis on communications-surveillance data, metadata, and
multimedia
g.. Security and privacy by obscurity vs. security and privacy by clarity
h.. Analytical and simulation models of communications and privacy
surveillance
i.. Network and traffic forensics for surveillance
j.. Censorship analysis, detection, and circumvention
k.. Policies and regulations regarding legal and illegal surveillance
l.. Experimental studies of and testbeds for communications and privacy
surveillance
Only submissions that describe previously unpublished, original, state-of-the-
art research that are not currently under review by a conference or journal
will be considered.
Articles should be understandable by a broad audience of computing science and
engineering professionals, avoiding a focus on theory, mathematics, jargon,
and abstract concepts. All manuscripts are subject to peer review on both
technical merit and relevance to Computer’s readership. Accepted papers will
be professionally edited for content and style.
Questions:
Please direct any correspondence before submission to the guest editors.
a.. Ying-Dar Lin, National Chiao Tung University, Taiwan
(ydlin-AT-cs.nctu.edu.tw)
b.. Jeffrey Voas, National Institute of Standards and Technology, USA
(jeff.voas-AT-nist.gov)
c.. Antonio Pescapè, University of Napoli Federico II, Italy
(pescape-AT-unina.it)
d.. Peter Mueller, IBM Zurich Research Laboratory, Switzerland
(pmu-AT-zurich.ibm.com)
Articles are due by 1 August 2015. For author guidelines and information on
how to submit a manuscript electronically, visit
www.computer.org/web/peerreviewmagazines/computer.
The submission site is:
https://mc.manuscriptcentral.com/com-cs
Login with your author ID and select "Author center". Then select "Click here
to submit a new manuscript" and select the manuscript type "SI: Mar 2016
Communications and Privacy Under Surveillance". From that point, please
continue to follow the instruction flow.
Schedule:
Manuscript Submission: August 1, 2015
Notification of Acceptance: November 1, 2015
Final Manuscript Due: December 1, 2015
Publication: March 2016

Last modified: 2015-05-09 21:12:24