[agents] Bio-Inspired Computing in Cyber Security -- Call for Book Chapters

Ali Ismail Awad alamer_2005 at yahoo.com
Wed Aug 28 06:42:35 EDT 2013


[Apologies for cross-posting]

=======Call for Book Chapters========= 
 Bio-Inspired Computing in Cyber Security
[http://egyptscience.net/BICCS/]

Aim and Scope
Recently,
 and due to the large diversity of the hackers and attacks, information 
security algorithms and application have become a crucial need for 
protecting almost all information transaction applications. Cyber 
security is an important branch of information security that is applied 
in computers and networks. This book covers the cyber security branch, 
and aims to ensemble the up-to-date advances of various topics in cyber 
security, and reports how organizations can gain competitive advantages 
by applying the different security techniques in the real-world 
scenarios. Chapters and studies which couple the intelligence systems 
and theories with specific cyber security-related
 problems are cordially invited. Survey articles that emphasize the 
research and application of cyber security are greatly welcome. The 
primary target audience for the book includes researchers, scholars, 
postgraduate students and developers who are interested in cyber 
security research and related issues. The book will provide reviews of 
the cutting–edge technologies, algorithms, applications and insights for
 cyber security-based systems. In particular, the book will be a 
valuable companion, and comprehensive reference for both postgraduate 
and senior undergraduate students who are taking a course in cyber 
security. The book will be organized in self-contained chapters to 
provide greatest reading flexibility.

 Topics of interest include, but are not limited to:
    Intrusion Detection Systems
    Assured Information Sharing
    Privacy and Freedom of Expression in
 Cyberspace
    Computer Crimes and Digital Forensic
    Biometric Technology
    Wireless Security
    Processing of Big Cyber Security Data
    Cloud Security
    Cryptography and Cryptanalysis
    Web Security and Attack Graph
    Stenography and Watermarking
    Security, Trust, and privacy in High Interest Applications
    Parallel Processing and Time Efficient Computing
    Multi-Net Security and Wireless Security
    Graphic Processing Unit (GPU), and its Security Applications
    Alert Correlations
    Multimedia Security
    Social Security
    Data Mining for Cyber Security
    Intelligent Cyber Security Analysis in Enterprise
 Networks
    Anti-disaster Applications of Immune Computing/ Autonomic Networking

Publication Schedule
The tentative schedule of the book publication is as follows:
    Deadline for paper submission: September 15, 2013
    First round notification : October 15, 2013
    Camera-ready submission: November 1, 2013
    Publication date: December, 2013

Chapter Submission
Submitted
 manuscripts should conform to the standard guidelines of the Springer's
 book chapter format. Manuscripts must be prepared using Latex, Word is 
not accepted, and according to the Springer's svmlt template that can be
 downloaded from the (link). Manuscripts that do not follow the 
formatting rules will be ignored. Prospective authors should send their
 manuscripts electronically to the following email addresses: 
(aawad at ieee.org), with cc-ing to (aboitcairo at gmail.com), with the 
subject title as: "Bio-Inspired Computing in Cyber Security - Book 
Chapter" in PDF. Submitted manuscripts will be refereed by at least two 
independent and expert reviewers for quality, correctness, originality, 
and relevance. The accepted contributions will be published in 
Intelligent Systems Reference Library by Springer. More information 
about Intelligent Systems Reference Library can be found (here).

 
Book Editors
Aboul-Ella Hassanien
Faculty of Computers & Information
Cairo University, Egypt
Chair of Scientific Research Group in Egypt (SRGE)
E-mail: aboitcairo at gmail.com

Ali Ismail Awad
Faculty of Engineering
Al Azhar University, Qena, Egypt
Scientific Research Group in Egypt (SRGE)
E-mail:
 aawad at ieee.org

Tai-hoon Kim
Multimedia Control and Assurance Laboratory
Hannam University, Korea
E-mail: taihoonn at empal.com

Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland
E-mail: Janusz.Kacprzyk at ibspan.waw.pl
======================================================================================


More information about the agents mailing list