[agents] CFP: Special issue on Cybersecurity, Cybercrime, Cyberwarfare
Scott Fowler
scott_fowler at ymail.com
Wed Jan 8 14:01:06 EST 2014
Special issue on Cybersecurity, Cybercrime, Cyberwarfare
Guest editor: Sherali Zeadally, University of Kentucky, USA
Journal of Homeland Security and Emergency Management
Journal web site: http://www.degruyter.com/jhsem
Editor-in-Chief: Dr. Renda-Tanali, Irmak; Managing Editor: Dr. McGee, Sibel
SCOPE
Over the recent decades, we have witnessed tremendous advances in computing, communications, and hardware
and software technologies, all of which continue to fuel the development, growth, and importance of cyberspace.
Today, governments and industry heavily depend on cyberspace for many of their daily operations.
Critical infrastructures are increasingly characterized by cyber interdependencies through their growing
reliance on computerized control systems that use and sustain electronic and informational linkages.
Cyberspace is also playing an important role in the personal lives of citizens around the world.
The social and economic well-being of all societies now depend on the safe, secure, and reliable
functioning of cyberspace. Such increased connectedness, however, puts the security of cyberspace
and critical personal, corporate, and national assets under the constant threat of criminal
and terrorist activities. Ranging from corporate espionage to hacking into systems that contain
nationally significant intelligence, cybercrimes and cyberwarfare are on the rise. The protection
of cyberspace has become a national priority for many nations. As a result, cybersecurity research
has been receiving a lot of attention from government, industry, and academia.
The goal of this special issue is to present state-of-the-art research results in the
areas of cybersecurity, cybercrime, and cyberwarfare. We are particularly interested in
innovative, scalable, cost-effective solutions that can improve the security and resiliency of cyberspace.
Solutions that adopt a multidisciplinary approach are particularly encouraged. Research areas
of relevance would therefore include (but not be limited to) the following topics:
• Cybersecurity incident response
• Cybersecurity economic modeling and metrics
• Cybersecurity standards, policy, law, and regulation
• Cyber risk and vulnerability assessment
• Cybercrime
• Cyber warfare
• Cybersecurity education
• Cyber forensic tools, techniques, and analysis
• Cyber threat modeling analysis
• Visual analytics for cybersecurity
• Cybersecurity testbeds, tools, methodologies
• Active and passive cyber defense techniques
• Insider threat detection and prevention
• Critical infrastructure protection
• Intrusion detection and prevention
• Botnet detection and mitigation
IMPORTANT DATES
Deadline for paper submission: May 1, 2014
Notification of acceptance: July 1, 2014
Expected publication date: 2014
SUBMISSION
All submitted papers (limited to a maximum of 16 pages) must be written in English.
We invite submission of original research articles—that is, articles that present research
that has not been previously published nor is currently under review by other journals
or conferences/symposia/workshops. Papers previously published as part of conference/workshop
proceedings may be considered for publication in the special issue, provided that they are
modified to contain at least 40 percent new/original content. Authors of such submissions
must clearly indicate in a separate letter to the guest editor at the time of submission
how their papers have been altered for this special issue. Moreover, authors must
acknowledge their previous papers in the manuscript and resolve any potential copyright
issues prior to submission.
All submissions will be reviewed by the guest editor, as well as by JHSEM senior
editors and anonymous referees.
Formatting instructions and author guidelines for preparing the manuscript can be
found at http://www.degruyter.com/jhsem. All manuscripts should be submitted
through http://mc.manuscriptcentral.com/dgjhsem. The author(s) must clearly state in
the cover letter that the paper is being submitted to the special issue.
GUEST EDITOR
Sherali Zeadally
314 Little Library Building
College of Communication and Information
University of Kentucky
Lexington, KY 40506-0224
USA
Email: szeadally at uky.edu
More information about the agents
mailing list