11 May 2015

Call for papers: "Security and Dependability of Networks and the Internet"

For a special issue of the International Journal of Internet Protocol Technology.

Currently, the usage of network and internet services is common and still growing day by day, but at the same time is raising various security issues. Networks are under security attacks of various kinds. Extensive attacks can cause a heavy loss in a few seconds. Therefore, securing networks is imperative. Researchers, analysts, designers and developers are taking considerable interest in different aspects of network and internet security. Advanced security methods and intrusion detection techniques can play a significant role in detecting and preventing security attacks. Reliable security solutions that rely on both in-depth cryptography and secure engineering such as data confidentiality, data integrity, authentication, non-repudiation and access control services are required.

In short, providing security in computer communications, networks and the internet is one of the major challenges of the current age. This special issue intends to present state-of-the-art research in the area of security for networks and the internet. It will focus on advances in cryptography, security engineering and its application issues for network and internet environments. It will also serve as a useful reference for cryptography, security and their applications and will inform readers of the most important state-of-the-art technologies in security and dependability of networks.

In this context, this special issue aims to publish high-quality, original, unpublished research papers covering all aspects related to security and privacy of networks and the internet.

Suitable topics include, but are not limited to, the following:
  • Access and usage control
  • Application security
  • Authentication and audits
  • Biometric security
  • Cloud security
  • Cryptographic protocols
  • Cyber-physical systems security
  • Data security and privacy
  • Digital forensics
  • Digital rights management
  • Distributed systems security
  • Formal models in security
  • Identity management
  • Intrusion detection and prevention
  • Intrusion tolerance and recovery
  • Key management
  • Language-based security
  • Malware analysis and mitigation
  • Network security
  • Operating systems security
  • Privacy and anonymity
  • Secure data streams
  • Security and usability
  • Security testing
  • Sensor and ad hoc network security
  • Smartphone security
  • Software security
  • Usable security
  • Vulnerability detection and mitigation
  • Web security

Important Dates
Submission deadline: 8 December, 2015

No comments: