posted by user: gtangil || 8859 views || tracked by 12 users: [display]

SIEM-BOOK 2012 : CALL FOR BOOK CHAPTERS: Advances in Security Information Management: Perceptions and Outcomes

FacebookTwitterLinkedInGoogle

Link: http://www.seg.inf.uc3m.es/siem_book_2012
 
When N/A
Where N/A
Submission Deadline Jun 1, 2011
Notification Due Nov 30, 2011
Final Version Due Dec 30, 2011
Categories    security   network security   system information and event m   intrusion prevention and detec
 

Call For Papers

* PLEASE SHARE the appended announcement with those who may be interested.
* Thank you.

CALL FOR CHAPTER PROPOSALS
Advances in Security Information Management: Perceptions and Outcomes

---------------------------------------------------------------------
Chapter proposal submission deadline June 1st, 2011 (*Extended)
Full chapter submission deadline July 1st, 2011
A book edited by Guillermo Suarez-Tangil and Esther Palomar
IT Security Group (SeTI)
Carlos III University of Madrid, Spain
Book Site: http://www.seg.inf.uc3m.es/siem_book_2012
Contact email: siem2012@easychair.org
To be published by Nova Science Publishers: www.novapublishers.com
---------------------------------------------------------------------

Overview
--------
We are pleased to invite you to submit your chapter proposals for the contribution to the book entitled “Advances in Security Information Management: Perceptions and Outcomes” by Nova Science Publishers. Please forward this call to colleagues and those interested in security information management.

Introduction
--------
Network security is still a critical task that involves different disciplines aimed at proactively protecting, preventing, and swiftly responding to attacks. However, the classic management-related flaws still persist, e.g. the analysis of large amounts of reported intrusion alerts, whilst coexisting with novel problematic issues such as the integration of many heterogeneous sensing interfaces. Security information and event management (SIEM) then appears as the new paradigm to reconcile traditional intrusion detection systems along to recent advanced techniques such as event collection, aggregation, analysis, management and correlation. For instance, research works have recently thrived important advances on SIEM such as those to enhance any task by providing intelligent learning as well as reducing the intervention of operators significantly. Moreover, intrusion techniques are more and more sophisticated to evade detection. Additionally, privacy concerns are at stake due to the spreading use of social networks and especially because of fraud attacks as well as self-organized and hardware constrained networks still pose many security challenges in terms of networks threats since traditional approaches cannot be globally adapted.
This book brings together the most novel research findings and the latest advances in security information management as well as compiling deeply settled technologies.

Audience
--------
This book will be useful not only for researchers, academics, developers and engineers at Universities, research centers, and in industry, but also for students in the field of security information management and its novel advances.

Recommended Topics
------------------
Original chapters on all aspects of security information management are invited. Submissions must not duplicate work that any of the authors has published elsewhere or submitted in parallel to any other conference or workshop with proceedings. Topics may include, but are not limited to, the following:
* System information and event management (SIEM).
* Intrusion prevention and detection mechanisms.
* Wireless intrusion prevention systems.
* Intrusion detection evasion techniques and tactics.
* Feature extraction methods.
* Malware behavior analysis.
* Network behavior analysis.
* Host and network-based intrusion prevention.
* Fully distributed intrusion detection approaches.
* Real-time adaptive security.
* SIEM hardware.
* SIEM, risk analysis and assessment.
* Data aggregation and log management.
* Intrusion event and alert correlation.
* Digital evidences and forensics.
* Security in self-organized and hardware constrained networks: MANETs, WSNs, VANETs, etc.
* SIEM in P2P networks.
* SIEM and Privacy.
* Privacy Enhancing Technologies.
* Privacy and Identity Management.
* SIEM and Social Networks.
* SIEM and Game Theory.
* SIEM in pervasive and ubiquitous scenarios.
* Economic fraud.
* Data loss prevention.
* Applied steganography to SIEM.
* Applied cryptograph to SIEM.
* Applied Artificial Intelligence to SIEM.

Submission Procedure
--------------------
Researchers and practitioners are invited to submit on or before June 1th 2011, a 2-3 pages chapter proposal clearly explaining the mission and concerns of the proposed chapter. Authors should include a brief biography including full name, affiliation, and position, tentative title and abstract, as well as recent publications. The web site http://www.seg.inf.uc3m.es/siem_book_2012 is dedicated to the development of this handbook and submissions will be received through easyChair system liked on the aforementioned site. Authors of accepted proposals will be notified by June 30th, 2011, about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 1st, 2011. Final camera ready will be due December 30th, 2011.
Chapter contributions should be 7,500-10,000 words each. All submitted chapters will be reviewed on a double-blind review bases. Therefore, the manuscript should be anonymous without author(s), affiliations, acknowledgements, nor obvious references.
Submission of a chapter for review would imply the commitment of the author(s) to publish the chapter in this book. Early submission is highly appreciated as the editors would like to have progressive dialogue and work with prospective authors to bring out a book of wide appeal. Authors of accepted chapters would be required to sign an agreement of copyright transfer and an originality statement with the publisher.

Guest editors
-------------
Guillermo Suárez-Tangil. Carlos III University of Madrid (Spain). gtangil@pa.uc3m.es
Esther Palomar. Carlos III University of Madrid (Spain). epalomar@inf.uc3m.es

Publisher
---------
Nova Science Publishers, Inc.
400 Oser Avenue, Suite 1600
Hauppauge, NY, 11788, United States
Tel: +631 231 7269
Fax: +631 231 8175
www.novapublishers.com

Important Dates
---------------
June 1th, 2011 (*Extended): Chapter Proposal Submission Deadline.
June 30th, 2011: Notification of Acceptance.
October 1st, 2011: Full Chapter Submission.
November 30th, 2011: Reviewers Comments.
December 30th, 2011: Camera-Ready Chapter Submission.


Please do not hesitate to contact us if you have any enquires. We look forward to receiving your proposal.
Yours sincerely,
The editors

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
IJCACS 2024   International Journal of Control, Automation, Communication and Systems
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
International Aristotelian Conference 2025   Call for Papers: International Aristotelian Conference 2025
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2