posted by organizer: aawad || 3880 views || tracked by 11 users: [display]

BICCS 2013 : Bio-Inspired Computing in Cyber Security

FacebookTwitterLinkedInGoogle

Link: http://egyptscience.net/BICCS/index.html
 
When N/A
Where N/A
Submission Deadline Oct 10, 2013
Notification Due Oct 31, 2013
Final Version Due Nov 10, 2013
Categories    cyber security   computing   bio-inspired   biometrics
 

Call For Papers

Call for Book Chapters

Bio-Inspired Computing in Cyber Security

Aim and Scope
Recently, and due to the large diversity of the hackers and attacks, information security algorithms and application have become a crucial need for protecting almost all information transaction applications. Cyber security is an important branch of information security that is applied in computers and networks. This book cover the cyber security branch, and aims to ensemble the up-to-date advances of various topics in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in the real-world scenarios. Chapters and studies which couple the intelligence systems and theories with specific cyber security-related problems are cordially invited. Survey articles that emphasize the research and application of cyber security are greatly welcome. The primary target audience for the book includes researchers, scholars, postgraduate students and developers who are interested in cyber security research and related issues. The book will provide reviews of the cutting–edge technologies, algorithms, applications and insights for cyber security -based systems. In particular, the book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber Security. The book will be organized in self-contained chapters to provide greatest reading flexibility.

Topics of interest include, but are not limited to:
* Intrusion Detection Systems
* Assured Information Sharing
* Privacy and Freedom of Expression in Cyberspace
* Computer Crimes and Digital Forensic
* Biometric Technology
* Wireless Security
* Processing of Big Cyber Security Data
* Cloud Security
* Cryptography and Cryptanalysis
* Web Security and Attack Graph
* Steganography and Watermarking
* Security, Trust, and privacy in High Interest Applications
* Parallel Processing and Time Efficient Computing
* Multi-Net Security and Wireless Security
* Graphic Processing Unit (GPU), and its Security Applications
* Alert Correlations
* Multimedia security
* Social security
* Data Mining for Cyber security
* Intelligent Cyber Security Analysis in Enterprise Networks
* Anti-disaster applications of immune computing/ Autonomic Networking

Publication Schedule
The tentative schedule of the book publication is as follows:
** Deadline for paper submission: September 15, 2013
** First round notification : October 15, 2013
** Camera-ready submission: November 1, 2013
** Publication date: December, 2013


Chapter Submission
Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, Word is not accepted, and according to the Springer's svmlt template that can be downloaded from the Springer's website. Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should send their manuscripts electronically to the following email addresses: (aawad@ieee.org), with cc-ing to (aboitcairo@gmail.com), with the subject title as: "Bio-Inspired Computing in Cyber Security - Book Chapter" in PDF. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published in Intelligent Systems Reference Library by Springer. More information about Intelligent Systems Reference Library can be found on Springer's website.


Book Editors
Aboul-Ella Hassanien
Faculty of Computers & Information
Cairo University, Egypt
E-mail: [aboitcairo@gmail.com]

Tai-hoon Kim
Multimedia Control and Assurance Laboratory
Hannam University, Korea
E-mail: [taihoonn@empal.com]

Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland
E-mail: [Janusz.Kacprzyk@ibspan.waw.pl]

Ali Ismail Awad (Corresponding Editor)
Faculty of Engineering
Al Azhar University, Qena, Egypt
E-mail: [aawad@ieee.org]

Related Resources

JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
ISCAI 2020   2020 2nd International Symposium on Computing and Artificial Intelligence (ISCAI 2020)
ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security
ACM--ICMLSC--EI Compendex, Scopus 2021   ACM--2021 The 5th International Conference on Machine Learning and Soft Computing (ICMLSC 2021)--EI Compendex, Scopus
EvoStar 2021   EvoStar 2021: The Leading European Event on Bio-Inspired Computation.
MLIOB 2020   International Conference on Machine Learning, IOT and Blockchain
Scopus-ASB 2021   2021 Asian Symposium on Biorobotics (ASB 2021)
Sensors (MDPI) 2020   Special Issue on Security, Trust and Privacy in New Computing Environments