posted by user: CIIA || 4120 views || tracked by 7 users: [display]

Extended deadline - IGI Global 2013 : Call For Chapters : Network Security Technologies: Design and Applications

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/213
 
When Sep 28, 2012 - Feb 28, 2013
Where USA
Submission Deadline Mar 15, 2013
 

Call For Papers

Editors

Dr. Abdelmalek Amine (University of Saida, Algeria),
Dr. Otmane Ait Mohamed (Concordia University, Canada), and
Dr. Boualem Benatallah (University of New South Wales, Australia)

http://www.igi-global.com/publish/call-for-papers/call-details/213

-------------------------------------------------------------------------------------

Introduction

Advances in telecommunications, IT technologies and emerging security challenges have produced a field—network security technologies—to deal with the art, the knowledge, methodologies and techniques from diverse areas including cryptography and network communication and protocols. As a field, network security technologies is devoted to solving security problems in a systematic way in order to ensure security of software and communication functionalities at basic, enhanced, integrated, and architectural levels.
-------------------------------------------------------------------------------------

Objective of the Book

This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in network security technologies. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information and knowledge society, including trust at the level of the global economy, of networks and organizations, of teams and work groups, of information systems and, finally, trust at the level of individuals as actors in the networked environments.

The book will cover the latest knowledge and technologies used and applied in network security. Also, it will analyze malicious threats, viruses, and attacks which can compromise network integrity at hardware or software levels.
-------------------------------------------------------------------------------------

Target Audience

The target audience of this book will be composed of professionals and researchers working in the field of information and knowledge management in various disciplines, e.g. library, information and communication sciences, administrative sciences and management, education, adult education, sociology, computer science, and information technology. Moreover, the book will provide insights and support to executives concerned with the management of expertise, knowledge, information and organizational development in different types of work communities and environments.
-------------------------------------------------------------------------------------

Recommended topics include, but are not limited to, the following:

Network and Wireless Network Security
Security for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, and personal communication systems
Peer-to-Peer Network Security
Ubiquitous Computing Security
Cryptographic protocols
Performance Evaluations of Protocols & Security Application
Security for Cloud Computing
Applying Trustworthy Computing Mechanisms to secure network protocols and distributed systems
-------------------------------------------------------------------------------------

Submission Procedure

Researchers and practitioners are invited to submit on or before September 28, 2012, an 8,000-10,000 word chapter related to the above topics. Please query for chapter guidelines and topic approval. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
-------------------------------------------------------------------------------------

Publisher

This book is scheduled to be published in 2013 by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.
-------------------------------------------------------------------------------------

Important Dates

September 28, 2012: Full Chapter Submission
January 10, 2013: Review Results Returned
February 28, 2013: Final Chapter Submission
March 15, 2013: Final Deadline
-------------------------------------------------------------------------------------

Inquiries and submissions can be forwarded electronically (Word document):

Dr. Otmane Ait Mohamed
ait@ece.concordia.ca

Related Resources

Ventana 4 2022   Extended deadline - Conference Ventana 4: Decolonial Dialogues from within and beyond the Global Margins
Edited Book in Springer-Verlag 2022   Call for Book Chapters-Machine Learning and Deep Learning for Time Series Processing and Analysis
GWC 2023   First Call for Papers Global WordNet Conference 2023
WebGPUGems 2023   Edited Book: Call for Book Chapters (WebGPU Gems) - WebGPU API
Chatbot Technology 2022   Call for Chapters: Trends, Applications, and Challenges of Chatbot Technology
AICE 2022   Call for Chapters: Artificial Intelligence Methods and Applications in Computer Engineering
SEN 2022   Social Epidemic Network (SEN), Call for Book Chapters
EWDE 2022   Call for Book Chapters: Empowering Women in the Digital Economy
SF 2022   Call For Springer BOOK Chapters: Green Finance Instruments, Fintech, and Investment Strategies: An Analysis of Sustainable Portfolio Management in the Post-COVID 19 Era
IJCKG 2022   [CfP] IJCKG-22 EXTENDED DEADLINE - International Joint Conference on Knowledge Graphs