This special issue addresses broad issues on cyber-security and information assurance in the context of cyber-assurance, from a technical and operational perspective. The main goal of is to bring together research which presents recent advances and achievements addressing the challenges related to cyber-assurance in traditional, cloud, distributed, grid and wireless computing environments. Additionally, we seek to provide academics, researchers, and practitioners with an opportunity to share their perspectives on the various aspects of cyber-assurance research, industry best practices and pedagogical developments of interest within the information security field.
Cyber-Assurance is emerging as a paradigm for the use and delivery of automated and/or embedded security amongst smart networks and devices. Due to the heavy utilisation of wireless technologies and the advent of innovative technologies, such as the Internet of Things (IoT), this renders data communications and operations very complicated. At the same time, the pace of processing data is significantly accelerated with the focus of how the data is delivered to these new systems, whereas the quick shifting of the focus will inevitably bring about swift and constant changes in the tactics of information security. New information assurance measures are required to be taken to secure these new infrastructures including using different kinds of automated technical defence measures and traffic monitoring and analysing processes and services executed within these new environments.
We encourage the submission of papers presenting novel research and development on technical related aspects on cyber-assurance. The papers may present new concepts and approaches related to cyber-assurance, automated tools and systems providing practical implementations supporting such methods and approaches, and the integration and configuration of security services in information systems architectures. In addition, we are also interested in application papers discussing the applicability of these methods and techniques to real-world problems. Submissions of original and unpublished works are invited, including research, theory and applications.
The issue will carry revised and substantially extended versions of selected papers presented at the Hawaii International Conference on System Sciences (HICSS-50), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Defensive monitoring technologies,
- Cyber threat and damage assessments
- Identification and classification of cyber-attacks
- Cyber anomalies and offenders
- Incident response
- Risk management
- Trend analysis
- Cyber policies and strategies to deal with security vulnerabilities
- Internet of Things security
Important Dates
Submission of manuscripts: 1 March, 2017
Notification to authors: 15 April, 2017
Final versions due: 1 May, 2017
No comments:
Post a Comment