CCS2018: Computer and Cyber Security: Principles, Algorithm, Applications and Perspectives |
Submission link | https://easychair.org/conferences/?conf=ccs2018 |
Abstract registration deadline | October 30, 2017 |
Submission deadline | October 30, 2017 |
Book on “Computer and Cyber Security: Principles, Algorithm, Applications and Perspectives”
Submission Guidelines
Introduction:
Today, computers are increasingly being used for storing and retrieving information. Some of this information is of a sensitive nature requiring adequate security measures to safeguard the sensitive information. Hence, awareness about the various tools and techniques for securing the information has become unavoidable. Keeping in view the exponentially increasing cyber crime and fraudulent online activities by fraudster, this edited book will delve into the various cyber fraud and the probable solutions thereof. Moreover, this book will introduce the principles of information security aspects. This book will also introduce the basics of computer security as the first step towards learning how to protect computers from hackers.
The book will begin by explaining the very basic concepts of computer and cyber security, will provide the substantial technical details to keep readers interested, and involved. The concepts, models and terms commonly used in the area of Computer security, identify and productively experiment with currently relevant Computer security issues and evaluate factors that influence the security of systems will be illustrated. The book will help to identify the interesting and exciting areas of future research to apply these techniques.
The book will help readers to follow their own paths of learning while it is structured in distinctive modules that allow for flexible reading. It will be a well-informed, revised, and comprehensible educational book that will address not only professionals but also students or anybody else interested in cyber security and needs an integrated source.
Objective of the Book:
The main objective of the book is to provide relevant theoretical frameworks and the latest empirical research findings in the area. It will be written for professionals who want to improve their understanding of the principles, challenges and applications of computer and cyber security. The book will help to identify the interesting and exciting areas of future research to apply these techniques. In addition, it will be an excellent book to teach a course on computer and cyber security. The material will prepare the students for exercising better protection in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation in a better manner. The chapter proposals will be selected in the following categories to make a balance of theory, future research directions and practical/use case i.e. Original research article, Case studies, and Review articles in the aforementioned domain.
Target Audience:
The target audience of this book will be composed of professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who are seeking to carry out research/develop software in the field of information and cyber security. The proposed book is likely to have global reader since the said subject is taught almost by every university worldwide by computer science and engineering and information technology departments.
Important Dates:
November 30, 2017: Full Chapter Submission
December 15, 2017: Review Results Returned
January 15, 2018: Final Acceptance Notification
March 15, 2018: Final Chapter Submission
Researchers and practitioners are invited to submit their full chapter of 8,000 to 12,000 words clearly explaining the mission and concerns of his or her proposed chapter on or before November 15, 2017 via Easychair (https://easychair.org/conferences/?conf=ccs2018) or can also email to Email id: bbgupta@nitkkr.ac.in. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Authors will be notified by December 15, 2017 about the decision of their chapter.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Computer and Cyber Security: Principles, Algorithm, Applications and Perspectives. All manuscripts are accepted based on a double-blind peer review editorial process.
Publisher:
This book is scheduled to be published by CRC press, USA. For additional information regarding the publisher, please visit https://www.crcpress.com/. This publication is anticipated to be released in 2018.
Editor(s):
Dr. Brij Gupta (National Institute of Technology Kurukshetra, Haryana, India)
Dr. Dharma P. Agrawal (University of Cincinnati, USA)
Dr. Haoxiang Wang (GoPerception Laboratory & Cornell University, USA)
List of Topics
· Fundamentals, Overviews, and Trends of Computer and Cyber Security
· Security and privacy in ad hoc networks
· Security and privacy in e-services
· Security and privacy in mobile systems
· Security and privacy in wireless sensor networks
· Cyber risk and vulnerability assessment cybercrime
· Cyber crime and warfare
· Cyber threat analysis and modelling
· Human factors in security and privacy
· Cyber forensic tools, techniques, and analysis
· Visual analytics for cyber security
· Cyber security testbeds, tools, and methodologies
· Security and privacy in smart grid and distributed generation systems
· Security and privacy in social applications and networks
· Active and passive cyber defense techniques
· Critical infrastructure protection
· Security and privacy in industrial systems
· Security and privacy in pervasive/ubiquitous computing
· Intrusion detection and prevention
· Botnet detection and mitigation
· Security and privacy of Robotic systems
· Security and privacy in ambient intelligence
· Biometric security and privacy
· Security and privacy of Web service
· Security and privacy in cloud computing
· Human factors in security and privacy
· Security and privacy in e-services
· Cyber crime and warfare
· Cryptography and Stenography
· Security and privacy in cloud computing
· Honeypots and Security
· Security Policies and Access Control
· Cryptography and cryptosystems
· Network security and management
· Wireless security
· Bluetooth, WiFi, WiMax security
· Cyber threats, implications and their defense
· Security standards and law
· Security modelling
Publication
CCS2018 Book will be published CRC Press, USA
Contact
Inquiries can be forwarded to:
Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India.
E-mail: bbgupta@nitkkr.ac.in