Wednesday, May 29, 2013

Call For Papers: Elsevier (Morgan Kaufmann) Book - Emerging Trends in Information and Communication Technologies Security; paper submission deadline: June 16, 2013



=======================================================================

                  Elsevier (Morgan Kaufmann) Book

                         CALL  FOR  PAPERS
                 Submission Deadline: June 16, 2013

                          Title of Book:
          Emerging Trends in Information and Communication
                      Technologies Security

                 Publication Date: September 2013

       All accepted papers are subject to relevant Elsevier
       Indexing (Elsevier indexing includes: Scopus, SCI
       Compendex, Engineering Village, EMBASE, and others).


=======================================================================

INVITATION:

You are invited to submit a paper for consideration (see below for submission instructions). All accepted papers will be published in the book entitled "EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES SECURITY";
publisher: Elsevier (Morgan Kaufmann). All accepted papers are subject to relevant Elsevier Indexing (Elsevier indexing includes: Scopus, www.info.scopus.com; SCI Compendex, Engineering Village, www.ei.org; EMBASE, www.info.embase.com; and others).


KEY FEATURES: this book will

O. Provide a multidisciplinary approach to security with coverage of
   communication systems, information mining, policy making, and management
   infrastructures.
O. Discuss deployment of numerous security solutions, including, cyber defense
   techniques and defense against malicious code and mobile attacks.
O. Address application of security solutions in real-life scenarios in several
   environments, such as social media, big data and crowd sourcing

DESCRIPTION:

EMERGING TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT) SECURITY, an edited book volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and provides the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios will provide, with an insider's look, security solutions deployed in real-life scenarios, including but not limited to smart devices, biometrics, social media, big data security, and crowd sourcing. The book is structured in four sections:

Part I:   Foundations and theoretical aspects of ICT security
Part II:  Trends, analytics, assessments and frameworks Part III: Implementation and deployment Part IV:  Application Scenarios

RECOMMENDED TOPICS AND THEMES:

In the context of ICT and security, topics of interest include, but are not limited to, the following:

Part I:   Foundations and theoretical aspects of ICT security
          This part will address the theories and concept which underpin various
          aspect of ICT (information and communications technologies).
          Part I core topics include:
          -> Networks and security requirements
          -> Information warfare
          -> Privacy
          -> Authentication, authorization and access
          -> Cryptography, cryptosystems and watermarking
          -> Cyber security management
          -> Critical infrastructure
          -> Policies
          -> Intrusion detection systems
          -> Security theories and practices for internet based solutions
          -> Countering and reducing ICT security risks
          -> Foundation of cloud security
          -> Enterprise security modelling

PART II:  Trends, analytics, assessments and frameworks
          This part will address analytical and evaluative frameworks, tools and
          concepts needed for understanding of security related issues in ICT
          context.
          Part II core Topics include:
          -> Performance analysis and evaluation
          -> Information assurances
          -> System certification
          -> Cyber security education
          -> Mission assurance and critical infrastructure
          -> Allied technologies
          -> Legal and ethical frameworks
          -> Security and threat assessment frameworks

Part III: Implementation and deployment
          This part will address the realization of security concepts. It provides
          the reader with the state of the art knowledge needed for successful
          deployment of a security solution.
          Part III core Topics include:
          -> Management of infrastructures
          -> Malicious code
          -> Cyber defense deployment
          -> Novel secrecy methods
          -> Algorithms and applications (from Concept to Code)
          -> e-Government security
          -> Mobile security
          -> Banking and financial sector

Part IV:  Application scenarios
          This part will address application of security solutions in real life
          scenarios. Part IV core Topics include:
          -> Smart devices security
          -> Biometrics
          -> Cyber Crime
          -> Security best practices
          -> Protection of critical infrastructure
          -> Social Media Security
          -> Cyber forensic
          -> Big Data security concept
          -> Crowd sourcing
          -> User Perspective


IMPORTANT DATES:

June 16, 2013:      Submission of papers/chapters for evaluation
July 1, 2013:       Notification of acceptance/not-acceptance
July 12, 2013:      Submission of typeset final papers/chapters for publication
                    + signed Copyright Agreements
Sep/Oct, 2013:      Publication of book.


SUBMISSION PROCEDURE:

Prospective authors are invited to submit their papers by uploading them to the evaluation web site at:
Submissions must be uploaded by June 16, 2013 and must be in either MS doc or pdf formats. All reasonable typesetting formats are acceptable: 11 to 12 as font size, single line spacing (later, the authors of accepted papers will be asked to follow a particular elsevier typesetting format to prepare their final papers for publication.) Papers must not have been previously published or currently submitted for publication elsewhere. The first page of the paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper. The first page should also include an abstract of about 100 to 150 words. Each submission is anticipated to be about 10 pages long (including: references, figures, tables, ...).

Each paper will be peer-reviewed by the editorial board for originality, significance, clarity, impact, and soundness. Chief Editors will be advised and supported by an International Editorial Advisory Board consisting of leading specialized experts from the academia and industry.

The book will be published by Elsevier (Morgan Kaufmann) and so all accepted papers will be subject to relevant Elsevier Indexing (Elsevier indexing includes: Scopus, www.info.scopus.com; SCI Compendex, Engineering Village, www.ei.org; EMBASE, www.info.embase.com; and others).


CO-EDITORS:

Babak Akhgar, FBCS
Professor of Informatics
Co-Director of CENTRIC

Hamid R. Arabnia, PhD., Fellow ISIBM
Professor of Computer Science
Editor-in-Chief, The Journal of Supercomputing (Springer) Co-Editor/Board, Journal of Computational Science (Elsevier) Elected Fellow, Int'l Society of Intelligent Biological Medicine (ISIBM) http://www.cs.uga.edu/~hra/

CONTACT:

Inquiries should be sent to: elsevier-ed@world-comp.org

Call for Late Breaking Papers, Position Papers, Extended Abstracts, Poster Papers with Deadline of June 2, 2013: The 2013 International Conference on Security and Management (SAM'13), USA, July 22-25, 2013




                         CALL  FOR  PAPERS
  CALL FOR LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS
                   Submission Deadline: June 2, 2013

     The 2013 International Conference on Security and Management
                              SAM'13

                  July 22-25, 2013, Las Vegas, USA
      Indexing: Scopus, SCI Compendex, Engineering Village, ...
                   http://sam.udmercy.edu/sam13/


IMPORTANT NOTE:
This announcement is ONLY for those who MISSED the opportunity to submit their papers in response to earlier "Call For Papers". Therefore, authors who have already submitted papers in response to earlier "Call For Papers"
should IGNORE this announcement. (Those who have been notified that their papers have been accepted, MUST still follow the instructions that were emailed to them; including meeting the deadlines mentioned in the notifications that were sent to them).


INVITATION:
You are invited to submit a "Late Breaking Paper", "Position Paper", or "Abstract/Poster Paper" for consideration. All accepted papers will be published in printed conference books/proceedings (ISBN) and will also be made available online. Like prior years, extended versions of selected papers (about 35%) will appear in journals and edited research books (publishers include: Springer, Elsevier, BMC, and others). In addition to the above, we have arranged two new book series; one with Elsevier publishers (Transactions on Computer Science and Applied Computing) and another with Springer publishers (Transactions of Computational Science and Computational Intelligence). After the conference, a significant number of authors of accepted papers of our congress, will be given the opportunity to submit the extended version of their papers for publication consideration in these books.
The web sites for the two book series will be made available after the logistics are finalized by our committee and the publishers (both book series projects have been approved.) We anticipate having between 10 to 20 books a year in each of these book series projects. Each book in each series will be subject to Elsevier and Springer science indexing products (which includes:
Scopus, Ei village, SCI, ...). 4042


INDEXING OF SAM CONFERENCE PROCEEDINGS:
The proceedings/books of this conference have been evaluated and approved for inclusion into science citation index / SCI databases. We are happy to report that the evaluation board of science citation index databases have APPROVED the indexing, integrating, and inclusion of the SAM proceedings into relevant Elsevier indexing databases (Elsevier indexing databases include, among others: Scopus, www.info.scopus.com; SCI Compendex, Engineering Village, www.ei.org; EMBASE, www.info.embase.com; and others).
In addition, the proceedings will also be indexed by a number of other science citation databases that track citation frequency/data for each paper.


IMPORTANT DATES:

June 2, 2013:       Submission of papers for evaluation
June 12, 2013:      Notification of acceptance/not-acceptance
June 20, 2013:      Registration
July 22-25, 2013:   The 2013 International Conference on Security and Management
                    (SAM'13)
August 10, 2013:    Camera-Ready Papers Due for publication
                    (Papers submitted and accepted in response to this announcement
                    will be published in the Final Edition of the proceedings which
                    will go to press soon after the conference; they will also be
                    indexed in science citation index databases.)

SAM'13 is composed of a number of tracks, including: tutorials, sessions, workshops, posters, and panel discussions. All tutorials are free to registered conference attendees - for a partial list of approved tutorials,
The conference will be held July 22-25, 2013, Las Vegas, USA.

SCOPE: Topics of interest include, but are not limited to, the following:

O  Network Security
   -Security Algorithms
   -Mobile Network Security
   -Security in CDN (Contents Distribution Networks)
   -Virtual Private Network (VPN)
   -Tracing Techniques in Internet
   -Active Networks
   -Security in Grid
   -Web Monitoring
   -Network Security Engineering
   -Transport-Level Security
   -Wireless Network Security
   -IP Security
   -Electronic Mail security

O  Cryptographic Technologies
   -Security Protocols
   -Key Management Techniques
   -Cryptographic Technologies
   -Applications of Block and Stream Ciphers
   -Applications of Public Key Cryptology
   -Message Authentication and Hash Functions
   -Anonymity
   -Digital Signature Schemes
   -Secret Sharing
   -Cryptanalysis

O  Security Management
   -Surveillance Technologies
   -Security Policies
   -Security for Protocol Management
   -Location Management
   -QoS Management
   -Resource Management
   -Channel Management
   -Mobility Management
   -Digital Contents Copyright Protection
   -System Security Management
   -Network Security Management
   -Management in Network Equipment
   -Storage Area Networks (SAN) Management
   -Information Security Management
   -Government Security Policy
   -Web Penetration Testing
   -Security Operations
   -Vulnerabilities Management

O  Security Education
   -Computer Security Education
   -Network Security Education
   -Cyber Security Education
   -Cyber Security Body of Knowledge
   -Information Assurance Education

O  Information Assurance
   -Mission Assurance
   -Risk Assessment and Risk Management
   -Continuity of Operations and Business Impact Analysis
   -Cyber Security Compliance
   -Security Auditing
   -Security-Savvy Software Development
   -Disaster Recovery
   -Business Continuity Analysis
   -Access Control
   -Secure Use of Software
   -Secure Performance

O  Biometrics and Forensics
   -Novel Biometric Methods
   -Forensics
   -Biological Security Technologies
   -Face Recognition Systems
   -Signature Recognition Systems
   -Cyber Forensics
   -Forensic Analysis
   -Biometric Technologies for Security
   -Feature Extraction and Matching Algorithms

O  Hardware Security
   -Embedded Systems Security
   -Cryptographic Processors and Co-Processors
   -Security Architectures
   -True and Pseudorandom Number Generators
   -Side Channel Attacks
   -Fault Attacks
   -Hardware Tamper Resistance
   -Smart Card Processors
   -Secure Storage Devices

O  Security Applications
   -Security in E-Commerce and M-Commerce
   -Secure OS
   -Watermarking
   -High-Tech Systems at Airports
   -Emerging Technologies and Applications
   -Cloud Computing Security
   -Database Security
   -Data Mining Security
   -Cyber Security Automation

O  Computer Security
   -Firewall Systems
   -Hacking Techniques and Related Issues
   -Intrusion Detection System (IDS)
   -Honeypot
   -Virus Issues (Detection, Prevention ...)
   -Trusted Computing
   -Alert Correlation
   -Attack Graphs
   -Incident Responding
   -Malware Analysis
   -Incident Responding


SUBMISSION OF LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS/POSTERS:

In response to this announcement, authors are given the opportunity to submit their papers for evaluation in one of the following three categories:

   1. Late Breaking Papers: describe late-breaking/recent developments in
      the field. The maximum number of pages is 7. Please write the following
      on the first page of your submission "SAM: LATE BREAKING PAPER".
      If accepted, The length of the final/Camera-Ready paper will be limited
      to 7 (two-column IEEE style) pages and the author will be given the
      opportunity to present the paper in a formal session.

   2. Position Papers: enable discussions on emerging topics without the
      experimentation normally present in an academic paper. Commonly,
      such papers will substantiate the opinions or positions put forward
      with evidence from an extensive objective discussion of the topic.
      The maximum number of pages is 4. Please write the following on the
      first page of your submission "SAM: POSITION PAPER".
      If accepted, The length of the final/Camera-Ready paper will be limited
      to 4 (two-column IEEE style) pages and the author will be given the
      opportunity to present the paper in a discussion/poster session.

   3. Abstract/Poster Papers: describe research roadmaps (similar to PhD
      plan or PhD prospectus). The maximum number of pages is 2. Please
      write the following on the first page of your submission
      "SAM: ABSTRACT/POSTER PAPER".
      If accepted, The length of the final/Camera-Ready paper will be limited
      to 2 (two-column IEEE style) pages and the author will be given the
      opportunity to present the paper in a discussion/poster session.

Prospective authors are invited to submit their papers (see above for paper categories) by uploading them to the evaluation web site at:
Submissions must be uploaded by June 2, 2013 and must be in either MS doc or pdf formats. All reasonable typesetting formats are acceptable (later, the authors of accepted papers will be asked to follow a particular typesetting format to prepare their final papers for publication.) Papers must not have been previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name, affiliation, postal address, and email address for each author. The first page should also identify the name of the Contact Author and a maximum of 5 topical keywords that would best represent the content of the paper.

Each paper will be peer-reviewed by two experts in the field for originality, significance, clarity, impact, and soundness. In cases of contradictory recommendations, a member of the conference program committee would be charged to make the final decision (accept/reject); often, this would involve seeking help from additional referees. Papers whose authors include a member of the conference program committee will be evaluated using the double-blinded review process. (Papers deemed to be philosophical, essay type, or about controversial topics/applications will not be refereed but may be considered for discussion/panels/presentation).

The proceedings will be published in printed conference books (ISBN) and will also be made available online. The proceedings will be indexed in science citation databases that track citation frequency/data for each published paper. Science citation databases include: relevant Elsevier indexing products (SCI Elsevier products include, among others: Scopus, www.info.scopus.com; Engineering Village, www.ei.org; EMBASE, www.info.embase.com; and others); Inspec / IET / The Institute for Engineering & Technology; The French National Center for Scientific Research, CNRS, INIST databases, PASCAL (accessable from INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN International); and others.

Note that authors who submit papers in response to this announcement, will have their papers evaluated for publication consideration in the Final Edition of the conference proceedings which will go to press soon after the conference (the conference would then make the necessary arrangements to ship the printed proceedings/books to such authors). The Final Edition of the conference proceedings will be identical to earlier edition except for a number of sections/chapters appended to the proceedings/book.

In addition to the above, we have arranged two new book series; one with Elsevier publishers (Transactions on Computer Science and Applied Computing) and another with Springer publishers (Transactions of Computational Science and Computational Intelligence). After the conference, a significant number of authors of accepted papers of our congress, will be given the opportunity to submit the extended version of their papers for publication consideration in these books. We anticipate having between 10 to 20 books a year in each of these book series projects. Each book in each series will be subject to Elsevier and Springer science indexing products (which includes: Scopus, Ei village, SCI, ...).


GENERAL INFORMATION:

SAM is an international conference that serves researchers, scholars, professionals, students, and academicians who are looking to both foster working relationships and gain access to the latest research results.
It is being held jointly (same location and dates) with a number of other research conferences; namely, The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing. The Congress is the largest annual gathering of researchers in computer science, computer engineering and applied computing. We anticipate to have 2,100 or more attendees from over 85 countries.

The 2013 Congress will be composed of research presentations, keynote lectures, invited presentations, tutorials, panel discussions, and poster presentations. In recent past, keynote/tutorial/panel speakers have included: Prof. David A. Patterson (pioneer, architecture, U. of California, Berkeley), Dr. K. Eric Drexler (known as Father of Nanotechnology), Prof. John H. Holland (known as Father of Genetic Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window System, xhost; OLPC), Prof. John Koza (known as Father of Genetic Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director, U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern California), Dr. Jose L. Munoz (NSF Program Director and Consultant), Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.), Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head, NASA Mars Exploration Program/2000-2005 and Associate Director, Project Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director, NASA's JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus, McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive Director, CERIAS and Professor, Purdue University), Dr. Sandeep Chatterjee (Vice President & Chief Technology Officer, SourceTrace Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA and former director of Division of Information and Intelligent Systems, National Science Foundation, USA), Dr. Flavio Villanustre (Vice- President, HPCC Systems), and many other distinguished speakers. To get a feeling about the Congress's atmosphere, see the 2012 delegates photos available at: http://infinitydempsey.smugmug.com/WorldComp

An important mission of the Congress is "Providing a unique platform for a diverse community of constituents composed of scholars, researchers, developers, educators, and practitioners. The Congress makes concerted effort to reach out to participants affiliated with diverse entities (such as: universities, institutions, corporations, government agencies, and research centers/labs) from all over the world. The Congress also attempts to connect participants from institutions that have teaching as their main mission with those who are affiliated with institutions that have research as their main mission. The Congress uses a quota system to achieve its institution and geography diversity objectives."

One main goal of the Congress is to assemble a spectrum of affiliated research conferences, workshops, and symposiums into a coordinated research meeting held in a common place at a common time. This model facilitates communication among researchers in different fields of computer science, computer engineering, and applied computing. The Congress also encourages multi-disciplinary and inter-disciplinary research initiatives; ie, facilitating increased opportunities for cross-fertilization across sub-disciplines.

USEFUL LINKS:

Partial list of tutorials:

Partial list of keynotes:

Location of the conference:


MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of March 14, 2013, papers published in the congress proceedings that SAM is part of, have received 27,591 citations (includes 3,342 self-citations). Citation data obtained from http://academic.research.microsoft.com/ .


CONTACT:

Inquiries should be sent to: daimikj@udmercy.edu