This special issue addresses broad issues on computational analysis and security. The invaluable data, which the researcher across different domains generates through their research efforts, has great interdependence to deduce meaningful hypothesis which germinates new discoveries and creates innovative results. Computational models are often coupled with high-performance computing to solve complex physical problems arising in engineering analysis and design.
We aim to bring together research which presents recent advances and achievements addressing the challenges related to computational analysis and security. Additionally, we seek to provide academics, researchers, and practitioners with an opportunity to share their perspectives on the various aspects of data security research, industry best practices and pedagogical developments of interest within the information security field.
We encourage the submission of papers presenting novel research and development on technical related aspects on computational analysis and security. The papers may present new concepts and approaches related to analysis, systems providing practical implementations supporting such methods and approaches, and the integration and configuration of security services in information systems architectures. In addition, we are also interested in application papers discussing the applicability of these methods and techniques to real-world problems. Submissions of original and unpublished works are invited, including research, theory and applications.
The issue will carry revised and substantially extended versions of selected papers presented at the 2nd International Conference on Futuristic Trend in Computational Analysis and Knowledge Management (ABLAZ2017), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Encryption technique
- Vulnerability discovery modelling
- Malware techniques /malware analysis
- Kernel level attacks
- Cloud security
- Anti-spying and counter surveillance
- Security of smart appliances
- Network Security and privacy
- Honey pots
- Wireless and Bluetooth security
- Denial and un-provable attacks
- Cyber and digital forensic
- Spying and surveillance
- Internet security & VPN
- IPSec and TLS
- Infrastructure security
- Cyber law and intellectual property rights
- Big data and security
- Critical infrastructure and control system cyber security
- Attach surfaces
Submission of manuscripts: 15 April, 2017
Notification to authors: 1 June, 2017
Final versions due: 1 July, 2017