Calls for Papers (special): International Journal of Information Security and Privacy (IJISP)


Special Issue On: Security Mechanisms

Guest Editors
G. Geetha (Lovely Professional University, India)

Introduction
Security mechanisms are features designed to detect, prevent, or recover from a security attack.

Objective

This special issue shall bring out the recent advancements in the field of security mechanisms. It includes:

  • Personnel : Access Tokens, Biometrics
  • Physical : Integrated Access Control
  • Managerial : Security Education
  • Data Networking : Encryption, Configuration Control
  • Software and Operating System: Testing, Evaluation, Trusted O/S, …
  • Hardware : Various Techniques

Specific security mechanisms include Encipherment, Digital signatures, Access controls, Data integrity, Authentication exchange, Traffic padding, Routing control, Notarization etc. Pervasive security mechanisms include Trusted functionality, Security labels, Event detection, Security audit trails, Security recovery etc.



Recommended Topics
  • Cryptography
  • Digital Signature
  • Cloud Security
  • Information Theory
  • Cyber Crime
  • Forensics
  • Intrusion Detection
  • Security Policies
  • Operating System Security
  • Certification
  • Biometrics
  • Web Security


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Security Mechanisms on or before the 29th February 2016. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/journals/guidelines-for-submission.aspx. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Dr. G. Geetha
Professor and Associate Dean
Division of Research and Development
Lovely Professional University, Punjab, India
Guest Editor
International Journal of Information Security and Privacy (IJISP)
E-mail: drggmca@gmail.com, geetha.15484@lpu.co.in

Special Issue On: Machine Learning Techniques for Information Security and Data Privacy

Submission Due Date
6/1/2017

Guest Editors
Kanubhai K. Patel, Charotar University of Science and Technology, India

Introduction
Current technology for information security and data privacy often does not mature completely because of regular changes in computer, network, and the general evolution of information and communication technology (ICT). Many improvements, from different perspectives, should be considered in the technology, so that the challenging nature of the requirements for the current and future computing environments can be accommodated. Untill now, efficient solutions for information security and data privacy, remains an elusive goal and a big challenge. Promising methodologies and technologies are required for the design and development of effective intelligent solutions. Machine Learning (ML) is a field of Artificial Intelligence (AI) that is concerned with constructing programs/systems that can improve their behavior with experience. Various machine learning techniques can be used for information security and data privacy to lead a secure information system to the extent possible. The focus of the special issue is on high quality research that addresses paradigms, development, applications and implications in the field of machine learning for addressing unique security issues introduced by new computing paradigms.

Objective
The objective of the special issue is to provide readers with a compilation of stimulating and up-to-date articles within the field of machine learning for information security and data privacy.

Recommended Topics
• Anomaly detection
• Autonomous and adaptive security
• Big data and digital forensics
• Biometrics
• Critical information and infrastructure security
• Cryptography and cryptanalysis
• Cloud forensics and security
• Cyber physical system security
• Dimensionality reduction
• Frequent event patterns mining
• Information assurance
• Information security audits
• Intrusion detection and prevention
• Network security and defense
• Malware analysis and detection
• Misuse detection
• Mobile networks and devices security
• Security in Software Defined Networks (SDN)
• Security in social networks
• Outlier detection
• Spam filtering
• Ransomware analysis and detection
• Rule mining and optimization
• Recent trends, technologies and applications
• Security risk analysis, modelling, evaluation and management
• Trust and privacy
• Video surveillance


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Machine learning techniques for Information Security and Data Privacy on or before June 01, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Kanubhai K. Patel
Guest Editor
International Journal of Information Security and Privacy (IJISP)
E-mail: kanupatel.mca@charusat.ac.in

Special Issue On: Cyber Security and Privacy in Communication Networks (CSPrivacy)

Submission Due Date
9/30/2017

Guest Editors
Dr C P Gupta
Associate Professor
Department of Computer Engineering, Rajasthan Technical University
Ph. No. +91-744-2473961(O)
Email: iccs@iaasse.org


Introduction
Owing to increase and sophistication of cyber-crimes conducted through the communication networks, the research community has been challenged to develop new technologies to make data transmission through communication networks secure. With more personal data being transported to and from cloud, protection of data during transit has become more significant. Adoption of technologies like VoIP, wearable computing and sensing devices, IoT etc. have posed new challenges in encryption and key management for such systems. Distributed Denial of Service (DDoS) have become more sophisticated than ever. The new threats require development of new security mechanisms, threat models and network models.

Objective
Development of provable security and information theoretic centric approaches are some new and emerging areas of research. The International Conference on Cyber Security (ICCS) 2016 provided a forum to the researchers to present their research and network with the people working in such areas. Selected papers from ICCS 2016 will be published in this special issue for the International Journal of Information Security and Privacy (IJISP) coined precisely as “Cyber Security and Privacy in Communication Networks”.

Recommended Topics
• Database Security
• Big Data Techniques in Cyber Security
• Digital Signature Techniques
• Forensic Analysis of Cyber Crimes
• Secure User Authentication
• Spam Protection
• Advance Persistent Threat
• Secret Sharing
• Key Management
• Security in Mobile Networks
• Hardware Security
• Cloud Security
• Cyber Physical System
• Network Protocols
• Network Security
• Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
• Secure Routing, Naming/Addressing, Network Management
• Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
• Security & Privacy in Peer-to-Peer and Overlay Networks
• Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
• Security & Isolation in Cloud, Data Center and Software-Defined Network


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on “Cyber Security and Privacy in Communication Networks” on or before July 30, 2017. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/journals/guidelines-for-submission.aspx.

Please follow the paper format and instructions given on this website (http://www.igi-global.com/publish/contributor-resources/before-you-write/) and indicate that the submission is to the special issue ‘CSPrivacy’

All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Dr C P Gupta
Email: iccs@iaasse.org