IoTSecurity 2016 - Call for Chapters: Security Solutions for Hyperconnectivity and the Internet of Things
Topics/Call fo Papers
Editors
Maurice Dawson, University of Missouri-St. Louis, USA
Marwan Omar, Embry-Riddle Aeronautical University World- Wide, USA
Mohamed Eltayeb, Colorado Technical University, USA
Call for Chapters
Proposals Submission Deadline: May 15, 2015
Full Chapters Due: August 15, 2015
Introduction
Cyber space is becoming an increasingly hostile environment with cyber criminals becoming innovative in their attacks and techniques. Thus there is an urgent need to design, implement, and deliver security solutions that meet the challenges of an increasingly insecure digital hyperconnected world. This book will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world. This book will provide insights into specific security solutions related to technological infrastructure, laws, regulations, and policies to make the cyber space more secure to promote the positive side of this innovative technology. Additionally, countermeasures such as network security, cyber security, defense in depth, trusted computing, and systems of systems security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Objective
This book will aim to provide cutting-edge research and the latest security solutions in the area of security in computing. The book will serve as a reference to discuss and implement new defense strategies and measure such as offensive security and preemptive protection. This book is written for researchers, practitioners, academicians, and Industry professionals who are interested in learning the latest and greatest security solutions to preemptively defend our cyber space against cyber criminals.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of cyber security, computer science, security engineering, systems of systems, hyperconnectivity, and information infrastructure. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Internet security
Hyperconnectivity
Internet of Things
Cyber security
Privacy and security
Human to human interaction
Human to computer interaction
Information leakage
Network security
Trusted computing
Data security and privacy
Cyber terrorism
Technology management
Complex systems
IPv6
Internet infrastructure
Unified communications
Social media
Security architectures
Human centered design
Mobile security
Virtual networks
Hypervisors
Submission Procedure
Researchers and practitioners are invited to submit on or before May 15, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by June 15, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by August 15, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication Security Solutions for Hyperconnectivity and the Internet of Things. All manuscripts are accepted based on a double-blind peer review editorial process. All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.
Book Series
For release in the Advances in Information Security, Privacy, & Ethics (AISPE) Book Series
ISSN: 1948-9730
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.
Important Dates
Proposal Submission Deadline: May 15, 2015
Full Chapter Submission: August 15, 2015
Review Results to Authors: October 15, 2015
Revised Chapter Submission: November 15, 2015
Inquiries
Dr. Maurice Dawson
University of Missouri- St. Louis
Department of Information Systems
College of Business Administration
228 Express Scripts Hall
One University Blvd
St. Louis, MO 63121-4400 USA
Phone: +1-314-516-6288
Email: dawsonmau-AT-umsl.edu & maurice.e.dawson-AT-gmail.com
Maurice Dawson, University of Missouri-St. Louis, USA
Marwan Omar, Embry-Riddle Aeronautical University World- Wide, USA
Mohamed Eltayeb, Colorado Technical University, USA
Call for Chapters
Proposals Submission Deadline: May 15, 2015
Full Chapters Due: August 15, 2015
Introduction
Cyber space is becoming an increasingly hostile environment with cyber criminals becoming innovative in their attacks and techniques. Thus there is an urgent need to design, implement, and deliver security solutions that meet the challenges of an increasingly insecure digital hyperconnected world. This book will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world. This book will provide insights into specific security solutions related to technological infrastructure, laws, regulations, and policies to make the cyber space more secure to promote the positive side of this innovative technology. Additionally, countermeasures such as network security, cyber security, defense in depth, trusted computing, and systems of systems security will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Objective
This book will aim to provide cutting-edge research and the latest security solutions in the area of security in computing. The book will serve as a reference to discuss and implement new defense strategies and measure such as offensive security and preemptive protection. This book is written for researchers, practitioners, academicians, and Industry professionals who are interested in learning the latest and greatest security solutions to preemptively defend our cyber space against cyber criminals.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of cyber security, computer science, security engineering, systems of systems, hyperconnectivity, and information infrastructure. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Internet security
Hyperconnectivity
Internet of Things
Cyber security
Privacy and security
Human to human interaction
Human to computer interaction
Information leakage
Network security
Trusted computing
Data security and privacy
Cyber terrorism
Technology management
Complex systems
IPv6
Internet infrastructure
Unified communications
Social media
Security architectures
Human centered design
Mobile security
Virtual networks
Hypervisors
Submission Procedure
Researchers and practitioners are invited to submit on or before May 15, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by June 15, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by August 15, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication Security Solutions for Hyperconnectivity and the Internet of Things. All manuscripts are accepted based on a double-blind peer review editorial process. All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.
Book Series
For release in the Advances in Information Security, Privacy, & Ethics (AISPE) Book Series
ISSN: 1948-9730
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.
Important Dates
Proposal Submission Deadline: May 15, 2015
Full Chapter Submission: August 15, 2015
Review Results to Authors: October 15, 2015
Revised Chapter Submission: November 15, 2015
Inquiries
Dr. Maurice Dawson
University of Missouri- St. Louis
Department of Information Systems
College of Business Administration
228 Express Scripts Hall
One University Blvd
St. Louis, MO 63121-4400 USA
Phone: +1-314-516-6288
Email: dawsonmau-AT-umsl.edu & maurice.e.dawson-AT-gmail.com
Other CFPs
- International Conference on Data Mining, Cloud Computing and Big Data
- International Conference on Electrical, Electronics, Communication Technologies and their Applications
- 3rd International Workshop on Cybercrimes and Emerging Web Environments
- 2015 International Conference on Software Engineering and Applications
- 2nd International Workshop on Mobile Medical Applications - Design and Development 2015
Last modified: 2015-05-30 13:00:11