posted by user: conwubiko || 6526 views || tracked by 12 users: [display]

SACND 2011 : Call for Book Chapters: Situational Awareness in Computer Network Defense: Principles, Methods and Applications

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=216a3334-f89b-4bd3-9681-208c67e34285
 
When Nov 15, 2010 - Sep 15, 2011
Where To be published by IGI Global
Submission Deadline Dec 15, 2010
Notification Due Jan 15, 2011
Final Version Due Jun 15, 2011
Categories    computer   security   information assurance   computer network defense
 

Call For Papers

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: December 15, 2010
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
A book edited by Cyril Onwubiko and Thomas Owens
Research Series Ltd, London, UK
Brunel University, London, UK

To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=216a3334-f89b-4bd3-9681-208c67e34285

Introduction
Computer crimes around the world cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT), that are responsible for ensuring availability, integrity and confidentiality of network services. Their primary challenge is to maintain situational awareness over many critical network objects some of which include critical national infrastructures, the impact of a cyber attack on which could result in a breakdown in national communications networks or essential support services, which may impact on citizens’ safety or livelihoods. Maintaining consistent high-level situational awareness over such objects requires that the CSIRT has the knowledge and ability to perceive and analyze situations that may have security related implications, make sound decisions on how to protect organizations' valued assets and offer accurate predictions of future states in a dynamic and complex environment. This is the underpinning of situational awareness in computer network defence.

Computer Network Defence (CND) is a growing field which is geared towards measures to protect and defend information, computers and networks from attacks that could cause disruption, denial of service, degradation and destruction. Situational awareness (SA) is described as knowing what is going on around you and within that knowledge of your surroundings and being able to identify which events in those surroundings are important. SA is very complex and involves very dynamic states, e.g. of a computer network with hundreds of network objects (firewalls, IDSes, routers, switches, servers, PADs etc). Maintaining a consistently high level of situational awareness over these objects can be challenging.

Objective of the Book
This book will provide security practitioners, academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations, for situational awareness in computer networks. The book will present situational awareness solutions in computer network defence (CND) currently being researched or deployed in book chapters contributed by leading researchers and practitioners in the field. The key objective is to fill a gap that exists in the way CND and security is being approached by formalizing the use of situational awareness in computer network security and defence. This will be achieved by providing contributions to situational awareness in network security and CND made through research, the prescription of formal concepts, and implementations. The book will supplement chapters on the theoretical (research) aspects of situational awareness in CND with discussion of their real-world implications and where applicable their implementations. The theoretical chapters will be complemented by chapters that address existing solutions for situational awareness in CND and the issues associated with them.

Target Audience
The primary audience for the book is professionals, practitioners, researchers and academics working in the field of Situational Awareness for Computer Network Defence which is evolving rapidly and growing as an area of information assurance. Practitioners and managers working in information security areas across all industries could significantly improve their knowledge and understanding of critical technical human and social aspects of situational awareness, and information security in general, by reading this book. Air Space Controllers, Aviation Systems and Defence Agencies will also find this book a very helpful and practical resource.

Recommended topics include, but are not limited to the following:

• Theoretical Underpinnings of Situational Awareness
• Analysis of Situational Awareness in Computer Networks
• Functional Requirements of Situational Awareness for Computer Network Security
• Situational Assessment and Human Factors
• Situational Assessment and Decision Marking
• Situational Understanding in Command and Control Networks (CCN)
• Situational Awareness in Military Operations
• Situational Awareness in C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
• Computer Network Defence (CND)
• Computer Network Operations
• Usefulness of Data Fusion for Security Incident Analysis
• Security incident analysis - Data Association and Correlation
• Security Information Visualization
• Security Monitoring
• Implementing Situational Awareness Systems
• Emerging Applications of Situational Awareness Solutions
• Incident Response and Management and Emergency Preparedness
• Computer Security Incident Response Teams (CSIRT)
• Information Security Metrics and Measurement
• Digital Forensics
• Forensics and Investigation Issues
• Digital Forensic Information Analysis
• Enterprise Information Security Policies, Standards and Procedures
• Risk Management, Governance and Compliance
• National and Critical Infrastructure Security Issues
• Trust, Privacy and Anonymity Issues
• Application Security, Audits and Penetration Testing
• Information Security
• Risk Assessment & Management
• Information Security Management Frameworks
• Security Event and Information Management
• Risks posed by Wireless Networks, including through the use of Mobile Computing, Smartphones & Apps in a CND environment.


Submission Procedure
Researchers and practitioners are invited to submit on or before November 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by December 15, 2011 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by March 15, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This book is anticipated to be released in 2011.

Important Dates
December 15, 2010: Proposal Submission Deadline
January 15, 2011: Notification of Acceptance
March 15, 2011: Full Chapter Submission
May 15, 2011: Review Results to Authors
July 15, 2011: Final Chapter Submission
August 15, 2011: Final Deadline



Inquiries and submissions can be forwarded electronically (Word document) or by mail to:

Dr. Cyril Onwubiko
Research Series Ltd
1 Meadway, Woodford, London, IG8 7RF, UK
Tel.: +44 (0) 7974 112418
E-mail: cyril.onwubiko@research-series.com
http://www.research-seeries.com
Personal: www.research-series.com/cyril


Dr. Thomas Owens
School of Engineering, Brunel University
Room H234, Uxbridge, Middlesex UB8 3PH, UK
Tel.: +44 (0) 1895 266608 • Fax: +44 (0) 1895 232806
E-mail: thomas.owens@brunel.ac.uk
http://www.brunel.ac.uk

Related Resources

The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
International Aristotelian Conference 2025   Call for Papers: International Aristotelian Conference 2025
IJCSITY 2024   International Journal of Computational Science and Information Technology
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
SIGCOMM 2025   ACM Special Interest Group on Data Communication