Vous êtes sur la page 1sur 3

12/10/2014

IGIGlobal:CallforChapterDetails
ShoppingCart | gupta.brij@gmail.com | Language:English
BOOKS

PublishwithIGIGlobal
ContributorResources
ProposalSubmission

JOURNALS

ERESOURCES

TEACHINGCASES

OnDEMAND

Searchtitle,author,ISBN...

TOPICCOLLECTIONS

CallforChapters:HandbookofResearchonModern
CryptographicSolutionsforComputerandCyberSecurity
Like

PublishingProcess

Tweet

PublishwithIGIGlobal

ResearchVideos
Newsroom

ResearchAreasofInterest

ProductCatalogs

CallforPapers
FAQ

ProductDistributors

ContactUs

Editors
Signuptoreceivenotificationson
futurepublishingopportunities!

MEDIA

PublicationFormats

PublishingOpportunities

RESOURCES

Dr.BrijGupta(NationalInstituteofTechnologyKurukshetra,Haryana,India)
Dr.DharmaP.Agrawal(UniversityofCincinnati,USA)
Dr.ShingoYamaguchi(YamaguchiUniversity,Japan)

Firstname*:

CallforChapters

Lastname*:

ProposalsSubmissionDeadline:December30,2014
FullChaptersDue:March31,2015

Email*:

Introduction

Jobtitle:

ForreleaseintheAdvancesinInformationSecurity,Privacy,andEthics(AISPE)BookSeries.

FreeDatabaseTrials
BookSeries
Newsletters

ISSN:19489730
University:
Department:
Researchinterests*:

TheAdvancesinInformationSecurity,Privacy,&Ethics(AISPE)BookSeriesprovidescuttingedge
researchontheprotectionandmisuseofinformationandtechnologyacrossvariousindustriesandsettings.
Comprisedofscholarlyresearchontopicssuchasidentitymanagement,cryptography,systemsecurity,
authentication,anddataprotection,thisbookseriesisidealforreferencebyITprofessionals,academicians,
andupperlevelstudents.
***

BrowsebySubject

Computersareusedforstoringandretrievinginformation.Someofthisinformationisverysensitive,requiring
adequatesecuritymeasurestosafeguardthem.Hence,awarenessaboutthevarioustoolsandtechniquesfor
securingtheinformationhasbecomecritical.Keepinginviewofexponentiallyincreasingcybercrimeand
fraudulentonlineactivitiesbyswindler,thiseditedbookwilldelveintothevariouscyberfraudandthe
probablesolutionsthereof.

Business&Management

Fewexamplesaregivenbelowtoshowhowthisareaisimportantandusedinoursocietytoday:

Submit

ComputerScience&IT
Education
Engineering
EnvironmentalScience
Library&Info.Science
Media&Communications
Medicine&Healthcare

Environmental
Sustainability
Includes10Titles

CyberWarfare:Modeofanyfuturewarcouldpossiblybecyberwar.Thereareseveralinstancesofone
countrypenetratingothernationscomputersandbuildingcybercommandcentrestotarget
telecommunication,transportationandpowergrid.Hence,developmentofsecurityprotocolsthatcould
handlecyberwarfareisasignificantresearchtest.
Spam:Today,over78%ofallemailssentovertheInternetareSpam.Itcostsmorethan$100billiontothe
businessescommunity.Now,SpamissentthroughBotnetofinfectedcomputers.Therefore,development
ofsecurityprotocolsforSpamfilteringisanotherrealresearchchallengeforcybersecurity.
WebSecurity:Phishingisachallengingissueforfinancialinstitutionsandbanks.Itisoneofthemost
commonandseriousthreatovertheInternet.ThefraudsterusesPhishingtostealthepersonal
informationofavictimeitherbyusingspoofedemailsorbyusingfakewebsitesorboth.Fordealingwith
thismaniac,thedevelopmentofthesecurityprotocolsforWebSecurityisabigresearchchallenge.

PublicAdministration
Security&Forensics

Inthefieldsofcomputersecurity,informationandcybersecurity,informationsystems,securityofadvanced
networks,etc.,thereexistsaneedforabookthataddressesthisarea.

SocialScience

Objective
Themainobjectiveofthebookistoproviderelevanttheoreticalframeworksandlatestempiricalresearch
findingsinthearea.Itwillbetargetedforprofessionalswhowanttoimprovetheirunderstandingofthebasic
principles,underlyingchallengesandpotentialapplicationsofcomputerandcybersecurity.Thebookwill
helpinidentifyinginterestingandexcitingareaswherethesetechniquescanbeappliedforfutureresearch.
Inaddition,itwillbeanexcellentcollectiontoteachacourseoncomputerandcybersecurity.Thematerial
willpreparestudentsintermsofunderstandingthemotivationoftheattackers,exercisingschemesfor
enhancedprotection,andhowtodealwithandmitigatethesituationinanefficientandeffectiveway.The
chapterproposalswillbeselectedinthefollowingcategoriestomakeabalanceoftheory,futureresearch
directions,andpracticaluse,viz.,Originalresearcharticle,Casestudies,andReviewarticlesin
aforementioneddomain.

TargetAudience
Thetargetaudienceofthisbookisexpectedtobeprofessionals,researchers,facultymembers,scientists,
graduatestudents,researchscholarsandsoftwaredeveloperswhoareseekingtocarryoutresearch/develop
softwareinthefieldofinformationandcybersecurity.Theproposedbookislikelytohaveglobalreadership
sincethesubjectisbeingtaughtbyalmosteveryinstitutionworldwidebycomputerscienceandengineering
andinformationtechnologydepartments.

RecommendedTopics
Fundamentals,Overviews,andTrendsinComputerandCyberSecurity
Securityandprivacyinadhocnetworks
Securityandprivacyineservices
Securityandprivacyinmobilesystems
Securityandprivacyinwirelesssensornetworks
Cyberriskandvulnerabilityassessmentcybercrime
Cybercrimeandwarfare
Cyberthreatanalysisandmodelling
Humanfactorsinsecurityandprivacy

http://www.igiglobal.com/publish/callforpapers/calldetails/1520

1/3

12/10/2014

IGIGlobal:CallforChapterDetails
Cyberforensictools,techniques,andanalysis
Securitymodelling
Visualanalyticsforcybersecurity
Cybersecuritytestbeds,tools,andmethodologies
Securityandprivacyinsmartgridanddistributedgenerationsystems
Securityandprivacyinsocialapplicationsandnetworks
Activeandpassivecyberdefensetechniques
Criticalinfrastructureprotection
Securityandprivacyinindustrialsystems
Securityandprivacyinpervasive/ubiquitouscomputing
Intrusiondetectionandprevention
Botnetdetectionandmitigation
SecurityandprivacyofRoboticsystems
Securityandprivacyinambientintelligence
Biometricsecurityandprivacy
SecurityandprivacyofWebservice
Securityandprivacyincloudcomputing
Humanfactorsinsecurityandprivacy
Securityandprivacyineservices
Cybercrimeandwarfare
CryptographyandStenography
Securityandprivacyincloudcomputing
HoneypotsandSecurity
SecurityPoliciesandAccessControl
Cryptographyandcryptosystems
Networksecurityandmanagement
Wirelesssecurity
Bluetooth,WiFi,WiMax,LTE,and5Gnetworksecurity
Cyberthreats,implicationsandtheirdefence
SecurityinIoT,WoTandsocialmedia
Securitystandardsandlaw

SubmissionProcedure
ResearchersandpractitionersareinvitedtosubmitonorbeforeDecember30,2014,achapterproposalof
1,000to2,000wordsclearlyexplainingthemissionandconcernsofhisorherproposedchapter.Authorswill
benotifiedbyJanuary15,2015aboutthestatusoftheirproposalsandsentchapterguidelines.Fullchapters
areexpectedtobesubmittedbyMarch31,2015.Allsubmittedchapterswillbereviewedonadoubleblind
reviewbasis.Contributorsmayalsoberequestedtoserveasreviewersforthisproject.
Note:Therearenosubmissionoracceptancefeesformanuscriptssubmittedtothisbookpublication,Modern
CryptographicSolutionsforComputerandCyberSecurity.Allmanuscriptsareacceptedbasedonadouble
blindpeerrevieweditorialprocess.
Fullchaptersmaybesubmittedtothisbookhere:SubmitaChapter
Allproposalsshouldbesubmittedthroughthe"ProposeaChapter"linkatthebottomofthispage.

Publisher
ThisbookisscheduledtobepublishedbyIGIGlobal(formerlyIdeaGroupInc.),aninternationalacademic
publisheroftheInformationScienceReference(formerlyIdeaGroupReference),MedicalInformation
ScienceReference,BusinessScienceReference,andEngineeringScienceReferenceimprints.IGI
Globalspecializesinpublishingreferencebooks,scholarlyjournals,andelectronicdatabasesfeaturing
academicresearchonavarietyofinnovativetopicareasincluding,butnotlimitedto,education,social
science,medicineandhealthcare,businessandmanagement,informationscienceandtechnology,
engineering,publicadministration,libraryandinformationscience,mediaandcommunicationstudies,and
environmentalscience.Foradditionalinformationregardingthepublisher,pleasevisitwww.igiglobal.com.
Thispublicationisanticipatedtobereleasedin2016.

ImportantDates
December30,2014:ProposalSubmissionDeadline
January15,2015:NotificationofAcceptance
March31,2015:FullChapterSubmission
May31,2015:ReviewResultsReturned
July15,2015:FinalAcceptanceNotification
July30,2015:FinalChapterSubmission

Inquiries
Dr.BrijGupta
NationalInstituteofTechnologyKurukshetra
Haryana,India
Email:bbgupta@nitkkr.ac.in

Back

LEARNMORE:
AboutIGIGlobal|Contact|Careers|Sitemap |FAQ

http://www.igiglobal.com/publish/callforpapers/calldetails/1520

2/3

12/10/2014

IGIGlobal:CallforChapterDetails

RESOURCESFOR:
Librarians|Authors/Editors|Distributors|Instructors|Translators
MEDIACENTER:
OnlineSymposium|Blogs|Catalogs|Newsletters

POLICIES:
PrivacyPolicy|ContentReusePolicy|EthicsandMalpractice
Copyright19882014,IGIGlobalAllRightsReserved
14.139.60.13

http://www.igiglobal.com/publish/callforpapers/calldetails/1520

3/3

Vous aimerez peut-être aussi