posted by user: cdp || 5792 views || tracked by 1 users: [display]

JUCS-ISMRE 2020 : JUCS Special Issue on Information Security Methodology, Replication Studies and Information Security Education

FacebookTwitterLinkedInGoogle

Link: http://www.jucs.org/ujs/jucs/info/special_issues/JUCS_Information_Security_Methodology_2020_CfP.pdf
 
When N/A
Where N/A
Submission Deadline Jan 20, 2019
Categories    security   computer science   communications   communications
 

Call For Papers

================================================================
Call for Papers

Journal of Universal Computer Science (J.UCS), www.jucs.org

Special Issue on Information Security Methodology, Replication Studies
and Information Security Education

-Impact Factor: 1.066-

http://www.jucs.org/ujs/jucs/info/special_issues/JUCS_Information_Security_Methodology_2020_CfP.pdf

================================================================


Important Deadlines

Submission by: 20 Jan 2020
Notification of authors by: 30 Apr 2020
Revised submission by: 10 Aug 2020
Notification about final decision by: 30 Nov 2020

================================================================

Guest Editors:

Steffen Wendzel, Hochschule Worms / Fraunhofer FKIE, Germany
(Corresponding Guest Editor)

Luca Caviglione, National Research Council of Italy (CNR), Italy

Alessandro Checco, University of Sheffield, United Kingdom

Aleksandra Mileva, University Goce Delcev, Macedonia

Jean-Francois Lalande, CentraleSupélec, France

Wojciech Mazurczyk, Warsaw University of Technology, Poland


================================================================

Background & Call for Manuscripts

In recent years, research started to focus on the scientific
fundamentals of information security. These fundamentals include several
important aspects such as the unified description of attacks and
countermeasures, the reproducibility of experiments and means to achieve
reproducibility, the sharing of research data and code, the discussion
of quality criteria for experiments and the design and implementation of
testbeds.
The related academic publications contributed to the advancement of
information security research, e.g. by making research contributions
easier to compare. Moreover, work on terminology and taxonomy addressed
redundancies and unified the understanding between different sub-domains
of information security.
This special issue desires to foster the progress in research on the
scientific methodology of information security, to improve the links
between sub-domains of information security research and to advance the
discussion on the scientific methodology in information security.
Moreover does this special issue welcome submissions that address
aspects of higher education in information security and submissions that
evaluate existing research results by reproducing experiments.


Topics of interest include, but are not limited to:

Data collection and measurement in information security research.
Work that reproduces existing experiments, i.e. that confirms/disproves
experimental results or that shows how replication platforms can be
realized in information security.
Work that discusses the underlying criteria for the design and
evaluation for cyber security research testbeds.
Provision of novel testbeds that advance the understanding of
information security sub-fields, e.g. by using visual analytics or by
automating steps previously conducted manually.
Evaluation of the novelty of research contributions and handling of
scientific re-inventions.
Methodology in network security, cryptography, information hiding, IoT
security, system security, digital forensics, and other sub-disciplines
of information security.
Methodology for privacy, information sharing and collaborative work in
the context of information security.
Advanced methods and evaluations of approaches in teaching information
security in higher education.
Submissions that present shared information security research
infrastructure, e.g. multi-national/multi-institutional testbeds or
frameworks.
Scientometric/bibliometric analyses, e.g. citation behavior, in
information security.

This special issue on Information Security Methodology and Replication
Studies is linked with the 1st International Workshop on Information
Security Methodology and Replication Studies (IWSMR 2019) held in
conjunction with the 14th International Conference on Availability,
Reliability and Security (ARES) in Canterbury, UK. Both, new research
papers and selected papers from the IWSMR'19 workshop are invited for
submission to this special issue.

Submission and Evaluation Procedure

The Journal of Universal Computer Science is a high-quality electronic
publication that deals with all aspects of computer science. J.UCS has
been appearing monthly since 1995 and is thus one of the oldest
electronic journals with uninterrupted publication since its foundation.
A number of special issues as well as the printed archive editions of
the volumes are also available in print and can be ordered directly from
J.UCS office. The impact factor of J.UCS is 1.066, the 5-year impact
factor 0.863 (2017). For further information, please refer to:

http://www.jucs.org/jucs_info/aims/unique_features.html

Manuscripts must be submitted in PDF format, written in English and
should not exceed 20 pages. Papers only prepared according to the JUCS’s
guidelines for authors and submitted online (see procedure described
below) will be included in the review process. Illustrations and tables
must be provided as integrated parts of the manuscript.

The guidelines for authors are available at:

http://www.jucs.org/ujs/jucs/info/submissions/style_guide.html

Only novel research papers which are currently not under review at
another event or a journal are accepted for the review process. For more
details, please also refer to:

http://www.jucs.org/ujs/jucs/info/special_issues/special_guidelines.html

For all potential authors who have received an invitation for an
extended version of their IWSMR’19 paper, please bear in mind that we
can only consider submissions which are significantly extended (at least
50 percent new material and the title of the extended version must
clearly and unmistakably differ from the title of the article presented
at the conference).

Please submit your original and proof-read papers not later than 20 Jan
2020 using the following submission link:

https://easychair.org/conferences/?conf=jucsismre2020

Each paper will be reviewed by at least 3 reviewers. According to the
covered main subjects in the content, a selected set of reviewers with
the appropriate expertise will be assigned.

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICCIP 2025   2025 The 11th International Conference on Communication and Information Processing (ICCIP 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IJCACS 2024   International Journal of Control, Automation, Communication and Systems
IMMS 2025   2025 the 8th International Conference on Information Management and Management Science (IMMS 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing