| |||||||||||||||
Book Chapters: Versatile Cyber-security 2018 : Call for Book Chapters Springer Book on Versatile Cyber-security, Editors: Mauro Conti, Gaurav Somani and Radha Poovendran | |||||||||||||||
Link: http://spritz.math.unipd.it/CFP/2017/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Book Title: Versatile Cybersecurity
Link: http://spritz.math.unipd.it/CFP/2017/ Series: Advances in Information Security Publisher: Springer International Publishing Editors: Mauro Conti, University of Padua, Italy Gaurav Somani, Central University of Rajasthan, India Radha Poovendran, University of Washington, USA Introduction: Cyber security research is one of the hot area in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country. After the IT revolution, an unprecedented growth has been seen in cyber-attacks and their impact in terms of financial damages and data losses. A steady growth is also visible in the newer forms of attacks with sophistication, stealth, scale and intelligent penetration. Cyber-attacks also necessitates continuous and unified efforts on designing defensive mechanisms to combat the range of evolving attacks and minimizing the damages incurred by various attacks. Cyber security as a discipline is also able to attract a good number of young minds opting to study and divulge into this area. There is a range of online and print resources available to study various research topics, relevant contributions and open problems related to cyber security. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any text available for advanced students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. The proposed book will fill this gap by creating a scholarly value if focused content related to specific attacks or attack families irrespective of the attack target or victim application is provided. These dedicated discussions (in the form of individual chapters) may cover the application or area specific aspects while discussing about the placement of defense solutions to combat the attacks. We envision this book to have 12 to 15 high quality invited chapters which address important attacks from theoretical (modeling) as well as practical aspects. This edited book can really become a great resource if each chapter brings a comprehensive and structured information about an attack or an attack family. We plan to present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. An example list of widely studied attacks/ attack families are given below. Many of these attack families have common characteristics with other families in this list. However, their isolated study of attacks and defense mechanisms is equally important and needed to bring its real and salient properties into discussion. As editors, we would like to bring a necessary balance between the commonality and the independent identity by bringing the required coverage. Book Type: The book will have edited chapters focusing on cyber security attacks and defense mechanisms. Aim and Scope: The major aim of this book is to provide a comprehensive base to the recent research and open problems in the area of cyber security research. We have felt that it is the much-needed ingredient to the researchers/ scholars who are about to start their research in the emerging area. State of the art problems, present solutions, and open research directions will always be positively welcomed by all the research groups, post-graduate programs, Doctoral programs around the globe in computer science and information technology. Target Group: This book will provide a comprehensive aid to prospective researchers and scholars who are considering working in this area. Being an emerging area, cyber security and related aspects have become a matter of extreme interest of budding researchers in the area. This book is aimed to provide a complete sketch towards all the research areas, recent works and open research problems in security research. Collecting and streamlining all these works in a single book requires large collaborative efforts from the community across the globe. This has also been envisaged that this book will continue to become a source of large interest for the time to come and would require adaptations time to time. Suggested Topics: The book aims to systematically collect and present quality research findings in the area of recent advances in cyber security area to give wide benefit to a huge community of researchers, educators, practitioners and industries. We provide a typical list of chapters coverage which may also include other suitable attacks/attack families. Submissions are solicited on the following topics, but not limited to: 1. Denial of Service Attacks 2. Social Engineering Attacks 3. Vulnerable Software Attacks 4. Side Channel Attacks 5. Data Breach Attacks 6. Brute Force Attacks 7. Financial Attacks 8. Malware Attacks 9. Drive-by- Download and Advertising 10. Covert Channels 11. Insider Attacks 12. Sophisticated Attacks 13. Spoofing/Impersonation Attacks 14. Reflection and Amplification Attacks Proposal Submission: Prospective authors should submit a 2-3 page proposal explaining the attack family, impact, attack launch, and various solutions. In order to have uniformity of the text and meet the predicted objectives of the book, each chapter in this edited book may follow the following structure: 1. Detailed introduction to the attack irrespective of the application area. 2. Impact on various domains/Statistics 3. Launch of the attack 4. Reasons for the success of this attack 5. Solutions from the literature with a systematic classification 6. New flavors/sophistication 7. Possible research directions Manuscript guidelines: http://www.springer.com/gp/authors-editors/book-authors-editors/book-manuscript-guidelines Important Dates: 1. Chapter proposals due date: August 30, 2017 2. Notification of acceptance of proposals: October 1, 2017 3. Full chapter submission: December 1, 2017 4. Chapter reviews feedback due date: December 25, 2017 (Each chapter will be reviewed by two/three experts to ensure the quality of work) 5. Camera-ready submission of revised chapters due date: January 15, 2018 6. Manuscript delivery to the publisher: February 28, 2018 Contact Information: Mauro Conti (Corresponding Editor, conti[AT]math[dot]unipd[dot]it), Security and Privacy Research Group, Department of Mathematics, University of Padua, Italy. Gaurav Somani (gaurav[AT]curaj[dot]ac[dot]in), Department of Computer Science and Engineering, Central University of Rajasthan, India. Radha Poovendran (rp3[AT]uw[dot]edu), Department of Electrical Engineering, University of Washington, USA. |
|