Call for Chapters: Forensic Investigations and Risk Management in Mobile and Wireless Communications

Editors

Kavita Sharma
National Institute of Technology Kurukshetra, India.

Mitsunori Makino
Chuo University, Japan.

Gulshan Shrivastava
National Institute of Technology Patna, India.

Basant Agarwal
SKIT, Jaipur, India

Call for Chapters

Proposals Submission Deadline: October 31, 2018
Full Chapters Due: November 20, 2018
Submission Date: January 20, 2019

Introduction

Mobile Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Mobile Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skilful practitioners can extract actionable information from practically any device that a government, private agency, or even a skilful individual might encounter. The field of Mobile forensic analysis is as rapidly changing as other security fields.

Objective

Mobile security when combined with mobile forensic gives rise to a term known as mobile investigation and analysis, which is nothing but a type of digital forensics which aims at the analysis of mobile device and data of a system for collection of information pertaining to the legal evidences related to various security breaches and intrusion detection. The mobile network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.

The two major tasks that are performed by it include:
• Keeping a check over anomalous traffic
• Intrusion detection

The intruder tries to steal the significant information from the communication that takes place in the mobile network. Mobile forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcement that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing mobile forensics like Wireshark. Another category of mobile forensic is mobile data analysis which deals with the Android and iOS and its applications. The use of malware analysis plays a crucial role in this.


Target Audience

The target audience of this book will be composed of professionals and researchers working in the field of mobile forensic and analytics, network security, computer science, security engineering, cybercrime and forensic computing. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.

Recommended Topics

Mobile Security: Attacks and Controls
Analysis of attacks, defences, and countermeasures
Anonymity, Privacy, ID theft and Ethics
Dependability and security forensics
Denial-of-Service and botnet analysis, detection, and mitigation
NetworkMinerCLI: Automating content extraction with our command line tool
Cyber Crime Toolkit Development
Securing Mobile Sensor Networks
Mobile Service Security
Problem in Cyber Ethics
Mobile Ad Hoc Network Security Vulnerabilities
Cyber Crimes and Profiling System
Impact of Mobile Data on Security
Forensic Impacts on Social Media Platforms Mobile Apps
Mobile Forensic: Today & Tomorrow
Smartphone Security & Forensic Analysis


Submission Procedure

Researchers and practitioners are invited to submit on or before October 31, 2018, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by November 20, 2018, about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by January 20, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager.


Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2019.

Important Dates

October 31, 2018: Proposal Submission Deadline
November 20, 2018: Notification of Acceptance
January 20, 2019: Full Chapter Submission
February 20, 2019: Review Results Returned
March 15, 2019: Final Acceptance Notification
April 30, 2019: Final Chapter Submission


Inquiries

Kavita Sharma
kavitasharma_06@yahoo.co.in

Mitsunori Makino
makino.fme7@g.chuo-u.ac.jp

Gulshan Shrivastava
gulshanstv@gmail.com

Basant Agarwal
thebasant@gmail.com


Back