CFC 2012 - Call For Chapters : Network Security Technologies: Design and Applications
View: 719
Website www.igi-global.com |
Edit Freely
Category CFC 2012
Deadline: April 27, 2012 | Date: November 30, 2012
Venue/Country: Online, Online
Updated: 2012-02-06 13:08:14 (GMT+9)
Call For Papers - CFP
Advances in telecommunications, IT technologies and emerging security challenges have produced a field?network security technologies?to deal with the art, the knowledge, methodologies and techniques from diverse areas including cryptography and network communication and protocols. As a field, network security technologies is devoted to solving security problems in a systematic way in order to ensure security of software and communication functionalities at basic, enhanced, integrated, and architectural levels.Objective of the BookThis book will aim to provide relevant theoretical frameworks and the latest empirical research findings in network security technologies. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information and knowledge society, including trust at the level of the global economy, of networks and organizations, of teams and work groups, of information systems and, finally, trust at the level of individuals as actors in the networked environments.The book will cover the latest knowledge and technologies used and applied in network security. Also, it will analyze malicious threats, viruses, and attacks which can compromise network integrity at hardware or software levels.Target AudienceThe target audience of this book will be composed of professionals and researchers working in the field of information and knowledge management in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support to executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.Recommended topics include, but are not limited to, the following:Network and Wireless Network SecuritySecurity for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systemsPeer-to-Peer Network SecurityDatabase and System SecurityIntrusion Detection and PreventionInternet Security & Applications Security & Network ManagementE-mail security, Spam, Phishing, E-mail fraudVirus, worms, Trojan ProtectionSecurity threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)Ubiquitous Computing SecurityWeb 2.0 securityCryptographic protocolsPerformance Evaluations of Protocols & Security ApplicationIntegrating security in Internet protocols: routing, naming, network managementSecurity for Cloud ComputingSecurity of Web-based applications and servicesAnti-malware techniques: detection, analysis, and preventionSecurity for future home networks, Internet of Things, body-area networksIntrusion prevention, detection, and responseCombating cyber-crime: anti-phishing, anti-spam, anti-fraud techniquesPrivacy and anonymity technologiesSecurity for Vehicular Ad-hoc Networks (VANETs)Security for peer-to-peer and overlay network systemsSecurity for electronic commerce: e.g., payment, barter, EDI, notarization, timestamping, endorsement, and licensingImplementation, deployment and management of network security policiesIntellectual property protection: protocols, implementations, metering, watermarking, digital rights managementPublic key infrastructures, key management, certification, and revocationSpecial problems and case studies: e.g., trade-offs between security and efficiency, usability, reliability and costSecurity for collaborative applications: teleconferencing and video-conferencingSecurity for large-scale systems and critical infrastructures (e.g., electronic voting, smart grid)Applying Trustworthy Computing mechanisms to secure network protocols and distributed systemsSubmission ProcedureResearchers and practitioners are invited to submit on or before February 15, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by February 28, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by April 27, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. PublisherThis book is scheduled to be published in 2013 by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. Important DatesFebruary 15, 2012: Proposal Submission DeadlineFebruary 28, 2012: Notification of AcceptanceApril 27, 2012: Full Chapter SubmissionJuly 27, 2012: Review Results ReturnedOctober 15, 2012: Final Chapter SubmissionNovember 30, 2012: Final Deadline Inquiries and submissions can be forwarded electronically (Word document): Dr. O. Ait Mohamedaitece.concordia.cahttp://www.igi-global.com/authorseditors/authoreditorresources/callforbookchapters/callforchapterdetails.aspx?callforcontentid=bfa951df-2f13-4ac8-825e-49f5545aedd3
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.