posted by user: GSomani || 3133 views || tracked by 3 users: [display]

Book Chapters: Versatile Cyber-security 2018 : Call for Book Chapters Springer Book on Versatile Cyber-security, Editors: Mauro Conti, Gaurav Somani and Radha Poovendran

FacebookTwitterLinkedInGoogle

Link: http://spritz.math.unipd.it/CFP/2017/
 
When N/A
Where N/A
Submission Deadline Aug 30, 2017
Notification Due Oct 1, 2017
Final Version Due Jan 15, 2018
Categories    cyber security   cyber attacks   defense mechanisms   protection
 

Call For Papers

Book Title: Versatile Cybersecurity

Link: http://spritz.math.unipd.it/CFP/2017/

Series:
Advances in Information Security

Publisher:
Springer International Publishing

Editors:
Mauro Conti, University of Padua, Italy
Gaurav Somani, Central University of Rajasthan, India
Radha Poovendran, University of Washington, USA


Introduction:
Cyber security research is one of the hot area in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country. After the IT revolution, an unprecedented growth has been seen in cyber-attacks and their impact in terms of financial damages and data losses. A steady growth is also visible in the newer forms of attacks with sophistication, stealth, scale and intelligent penetration. Cyber-attacks also necessitates continuous and unified efforts on designing defensive mechanisms to combat the range of evolving attacks and minimizing the damages incurred by various attacks. Cyber security as a discipline is also able to attract a good number of young minds opting to study and divulge into this area. There is a range of online and print resources available to study various research topics, relevant contributions and open problems related to cyber security.

A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any text available for advanced students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. The proposed book will fill this gap by creating a scholarly value if focused content related to specific attacks or attack families irrespective of the attack target or victim application is provided. These dedicated discussions (in the form of individual chapters) may cover the application or area specific aspects while discussing about the placement of defense solutions to combat the attacks. We envision this book to have 12 to 15 high quality invited chapters which address important attacks from theoretical (modeling) as well as practical aspects.

This edited book can really become a great resource if each chapter brings a comprehensive and structured information about an attack or an attack family. We plan to present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. An example list of widely studied attacks/ attack families are given below. Many of these attack families have common characteristics with other families in this list. However, their isolated study of attacks and defense mechanisms is equally important and needed to bring its real and salient properties into discussion. As editors, we would like to bring a necessary balance between the commonality and the independent identity by bringing the required coverage.

Book Type:
The book will have edited chapters focusing on cyber security attacks and defense mechanisms.

Aim and Scope:
The major aim of this book is to provide a comprehensive base to the recent research and open problems in the area of cyber security research. We have felt that it is the much-needed ingredient to the researchers/ scholars who are about to start their research in the emerging area. State of the art problems, present solutions, and open research directions will always be positively welcomed by all the research groups, post-graduate programs, Doctoral programs around the globe in computer science and information technology.

Target Group:
This book will provide a comprehensive aid to prospective researchers and scholars who are considering working in this area. Being an emerging area, cyber security and related aspects have become a matter of extreme interest of budding researchers in the area. This book is aimed to provide a complete sketch towards all the research areas, recent works and open research problems in security research. Collecting and streamlining all these works in a single book requires large collaborative efforts from the community across the globe. This has also been envisaged that this book will continue to become a source of large interest for the time to come and would require adaptations time to time.

Suggested Topics:
The book aims to systematically collect and present quality research findings in the area of recent advances in cyber security area to give wide benefit to a huge community of researchers, educators, practitioners and industries. We provide a typical list of chapters coverage which may also include other suitable attacks/attack families. Submissions are solicited on the following topics, but not limited to:
1. Denial of Service Attacks
2. Social Engineering Attacks
3. Vulnerable Software Attacks
4. Side Channel Attacks
5. Data Breach Attacks
6. Brute Force Attacks
7. Financial Attacks
8. Malware Attacks
9. Drive-by- Download and Advertising
10. Covert Channels
11. Insider Attacks
12. Sophisticated Attacks
13. Spoofing/Impersonation Attacks
14. Reflection and Amplification Attacks

Proposal Submission:
Prospective authors should submit a 2-3 page proposal explaining the attack family, impact, attack launch, and various solutions. In order to have uniformity of the text and meet the predicted objectives of the book, each chapter in this edited book may follow the following structure:
1. Detailed introduction to the attack irrespective of the application area.
2. Impact on various domains/Statistics
3. Launch of the attack
4. Reasons for the success of this attack
5. Solutions from the literature with a systematic classification
6. New flavors/sophistication
7. Possible research directions

Manuscript guidelines:
http://www.springer.com/gp/authors-editors/book-authors-editors/book-manuscript-guidelines

Important Dates:
1. Chapter proposals due date: August 30, 2017
2. Notification of acceptance of proposals: October 1, 2017
3. Full chapter submission: December 1, 2017
4. Chapter reviews feedback due date: December 25, 2017 (Each chapter will be reviewed by two/three experts to ensure the quality of work)
5. Camera-ready submission of revised chapters due date: January 15, 2018
6. Manuscript delivery to the publisher: February 28, 2018

Contact Information:
Mauro Conti (Corresponding Editor, conti[AT]math[dot]unipd[dot]it), Security and Privacy Research Group, Department of Mathematics, University of Padua, Italy.
Gaurav Somani (gaurav[AT]curaj[dot]ac[dot]in), Department of Computer Science and Engineering, Central University of Rajasthan, India.
Radha Poovendran (rp3[AT]uw[dot]edu), Department of Electrical Engineering, University of Washington, USA.

Related Resources

The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
International Aristotelian Conference 2025   Call for Papers: International Aristotelian Conference 2025
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”
HAICTW 2025   Human-AI Collaboration Transforming Workforces with Gen AI