ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IJICA 2018 - CFP: Special Issue on Recent Advances in Bio-inspired Computing Paradigms for Security and Privacy of Innovative Computing in International Journal of Innovative Computing and Applications (Inderscience, SCOPUS Indexed)Due Date 15 September, 2018

Date2018-09-15

Deadline2018-09-15

VenueOnline, Online Online

KeywordsBio-inspired Computing; Security and Privacy; Forensic analysis of evidence

Websitehttps://www.inderscience.com/info/ingene...

Topics/Call fo Papers

Http://www.inderscience.
com/info/ingeneral/cfp.php?id=4258
Special Issue on: "Recent Advances in Bio-inspired Computing Paradigms for Security and Privacy of Innovative Computing"
Guest Editors:
Gulshan Shrivastava, National Institute of Technology Patna, India
Sheng-Lung Peng, National Dong Hwa University, Taiwan
Mitsunori Makino, Chuo University, Japan
Nhu Nguyen Gia, Duy Tan University, Vietnam
The focal objectives of this special issue are to provide insight mechanisms while handling innovative computing; provide conceptual understanding of machine-to-machine security issues, challenges and mechanisms; develop basic skills in bio-inspired secure innovative computing architectures; and to explain the theory behind the security of fog computing, Internet of Things and different cryptographic algorithms. The issue will also provide a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, concerns and practical challenges encountered, and the solutions adopted in these fields.
Today, cloud computing services are becoming indubitable parts of modern information and communication systems in our daily lives. Cloud computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through innovative computing to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. However, innovative computing services open a number of security and privacy issues and challenges that are becoming a key research area. The rapid advances in information technologies – such as cloud computing, sensors and IoT – have played a significant role in the smart city context. The smart city contributes to enhancing life services and processes large data streams, which in turn raises security and privacy concerns. However, handling security and privacy challenges is essential for smart cities, which encourages organisations to explore new computing paradigms. Recently, we have been witnessing a lot of literature on security and privacy that includes end-to-end security, trustable data acquisition, transmission, processing, legitimate service provisioning and privacy of personal data, as well as the role of bio-inspired computing approaches in achieving system design and operations. Furthermore, the use of bio-inspired computing techniques (evolutionary computation, particle swarm optimisation, ant colony optimisation, etc.) for intelligent decision support has been exploited to originate effectual computing systems. The concept of applying computational intelligence (CI) approaches in innovative computing analysis is feasible and sound. Moreover, CI and its associated learning paradigms have played vital roles in a large number of application areas related to security and privacy in information systems. The CI paradigm consists of various branches that include but are not limited to expert systems, artificial immune systems, swarm intelligence, fuzzy systems, neural networks, evolutionary computing and various hybrid systems, which are combinations of two or more of these branches.
The goal of this special issue is to present state-of-art research and developments in CI approaches for security and privacy of innovative computing and secure innovative computing services, novel attacks on innovative computing services, and novel defences for innovative computing services attacks and innovative computing security analysis. We invite researchers to contribute original research articles as well as comprehensive review articles that seek to understand CI techniques, leading to real-world innovative computing challenges and future improvements for security and privacy for fog and mobile edge computing services. We expect contributions to address the latest research, innovative ideas, challenges and bio-inspired computing solutions in security and privacy aspects of the smart city.
Subject Coverage
Suitable topics include, but are not limited, to the following:
Bio-inspired software and hardware systems for innovative Computing
Security, robustness and resilience for innovative computing
Anomaly (spam, virus, intrusion, etc.) detection
Bio-mimetics related to cyber security and networking
Crime detection based on multimodal analysis
Event detection and tracking
Artificial neural networks and neural systems applied to fog computing
Mitigating the privacy risks of fog networking
Information fusion for security
Machine learning-based smartphone analysis
Machine learning to gain novel insights into innovative computing
Adaptation algorithms for innovative computing security and networking
Biometrics related to innovative computing security and networking
Bio-inspired security and networking algorithms and technologies
Bio-inspired cyber threat intelligence methods and systems for innovative computing
Prediction techniques for innovative computing security and networking
Information-hiding solutions (steganography, watermarking) and detection for network traffic
Cooperative defense systems and bio-inspired algorithms for dependable networks
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
If you have any queries concerning this special issue, please email Gulshan Shrivastava at gulshan.shrivastava-AT-ieee.org.
Important Dates
Manuscripts due by: 15 September, 2018
Notification to authors: 15 November, 2018
Final versions due by: 15 December, 2018

Last modified: 2018-04-20 18:41:53