lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 09 Aug 2013 08:26:41 -0400
From: "Justin C. Klein Keane" <justin@...irish.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Special Issue "Threat Detection,
 Analysis and Defense" of JISA

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, yes, it is very common:

http://www.crypto.com/blog/copywrongs/

Justin C. Klein Keane
http://www.MadIrish.net

Any digital signature on this message can be confirmed using
the GPG key at http://www.madirish.net/gpgkey

On 08/09/2013 06:08 AM, Bart van Tuil wrote:
> I am shocked, i am.  ... Is this common practice?!
> 
> 
> 
> Alex, vrijdag 9 augustus 2013 10:51
> 
> Elsevier sells the journals to universities for crazy amounts (the
> top 10 from university of karlsruhe can be seen here
> http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with
> 20000 Euro beeing the most expensive one). Althought you submit
> your paper for free (or even pay for "corrections").
> 
> Please consider boycotting Elsevier (like these guys
> http://www.economist.com/node/21545974).
> 
> Doing the right thing > impact factor.
> 
> 
> 
> Am 2013-08-09 09:26, schrieb Konrad Rieck:
> 
> CALL FOR PAPERS
> 
> 
> 
> Special Issue on Threat Detection, Analysis and Defense
> 
> Journal of Information Security and Applications
> 
> 
> 
> Please consider the following opportunity to submit and publish
> 
> original scientific results to a special issue of the Journal of
> 
> Information Security and Applications (Elsevier) on "Threat
> Detection,
> 
> Analysis and Defense"
> 
> 
> 
> The submission deadline is September 30, 2013.
> 
> 
> 
> http://bit.ly/13ku0Ga
> 
> http://ees.elsevier.com/jisa/
> 
> 
> 
> 
> 
> TOPICS
> 
> 
> 
> This special issue is intended to bring forth the recent
> advancements
> 
> in the detection, modeling, monitoring, analysis and defense of
> 
> various threats posed to sensitive data and security systems from
> 
> unauthorized or other inappropriate access.  Areas to be covered
> 
> include but are not limited to:
> 
> 
> 
> * Monitoring: Novel tools and techniques for monitoring mounting
> threats
> 
> including monitoring of ongoing attacks.
> 
> * Detection solutions: Innovations in the detection of intrusions,
> 
> malware and its activity, including post-attack forensics.
> 
> * Infrastructure: Improvements in network traffic security analysis
> for
> 
> identification of threats.
> 
> * Threat modelling: Advances in the tools, technologies and
> processes
> 
> used in anticipating attacks.
> 
> * Emergent problems: New threats resulting from new business models
> for
> 
> transfer of value, from gold-farming to Paypal and Bitcoins.
> 
> * Security designs: Innovations in security architectures,
> approaches
> 
> and systems responding to specific emerging threats.
> 
> 
> 
> 
> 
> IMPORTANT DATES
> 
> 
> 
> * Paper submission: September 30, 2013
> 
> * First-round notification: November 30, 2013
> 
> * Revision: January 13, 2014
> 
> * Final decision: March 14, 2014
> 
> * Submission of final paper: April 14, 2014
> 
> * Publication date: July 2014
> 
> 
> 
> 
> 
> SUBMISSION DETAILS
> 
> 
> 
> Paper submissions for the special issue should follow the
> submission
> 
> format and guidelines for regular papers submitted to Journal of
> 
> Information Security and Applications (JISA). All the papers will
> be
> 
> peer-reviewed following the JISA reviewing procedures.
> 
> 
> 
> 
> 
> GUEST EDITORS
> 
> 
> 
> Alan Woodward
> 
> Charteris plc and University of Surrey, UK
> 
> alan.woodward (AT) surrey.ac.uk
> 
> 
> 
> Andrew Rogoyski
> 
> Roke Manor Research Ltd, UK
> 
> andrew.rogoyski (AT) roke.co.uk
> 
> 
> 
> Konrad Rieck,
> 
> University of Goettingen, Germany
> 
> konrad.rieck (AT) uni-goettingen.de
> 
> 
> 
> Shujun Li
> 
> University of Surrey, UK
> 
> Shujun.Li (AT) surrey.ac.uk
> 
> 
> 
> _______________________________________________
> 
> Full-Disclosure - We believe in it.
> 
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> 
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> 
> 
> 
> _______________________________________________ Full-Disclosure -
> We believe in it. Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
> sponsored by Secunia - http://secunia.com/
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iPwEAQECAAYFAlIE3/4ACgkQkSlsbLsN1gA5aQb8CDQgYiwUJFoiWHFRLsiA8ADZ
pTISEi5zuAp2COZJd9Wjlu+dc/2HEPG2xcHHJ00DB6X5doNti1ubc0nBfeZy6A9A
CCQfjJHUiw25NrFvmoEpayXvDrkIHLdqER/jVa1IT0ep8j6rIugAT6gp5h5xuMst
FiQtl6VtxxCwLqqeI3BS+AhOiFHaGUZrbLEkGoM8GZciq3BpsiHiAselIjRBaHP8
eH8+iI6Hl89vkH53NuuCMdvUFifyy9TV8hZc8ZMC4nlu+eZAu+GA9nqNpJULNOl6
WDqJGG+o5iZWrB2Acg4=
=QQJ+
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ