lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 Aug 2013 10:08:50 +0000
From: Bart van Tuil <>
To: Alex <>
Cc: "" <>
Subject: Re: Special Issue "Threat Detection,
 Analysis and Defense" of JISA

I am shocked, i am.  ... Is this common practice?!

Alex, vrijdag 9 augustus 2013 10:51

Elsevier sells the journals to universities for crazy amounts (the top 10 from university of karlsruhe can be seen here with 20000 Euro beeing the most expensive one). Althought you submit your paper for free (or even pay for "corrections").

Please consider boycotting Elsevier (like these guys

Doing the right thing > impact factor.

Am 2013-08-09 09:26, schrieb Konrad Rieck:


Special Issue on Threat Detection, Analysis and Defense

Journal of Information Security and Applications

Please consider the following opportunity to submit and publish

original scientific results to a special issue of the Journal of

Information Security and Applications (Elsevier) on "Threat Detection,

Analysis and Defense"

The submission deadline is September 30, 2013.


This special issue is intended to bring forth the recent advancements

in the detection, modeling, monitoring, analysis and defense of

various threats posed to sensitive data and security systems from

unauthorized or other inappropriate access.  Areas to be covered

include but are not limited to:

 * Monitoring: Novel tools and techniques for monitoring mounting threats

   including monitoring of ongoing attacks.

 * Detection solutions: Innovations in the detection of intrusions,

   malware and its activity, including post-attack forensics.

 * Infrastructure: Improvements in network traffic security analysis for

   identification of threats.

 * Threat modelling: Advances in the tools, technologies and processes

   used in anticipating attacks.

 * Emergent problems: New threats resulting from new business models for

   transfer of value, from gold-farming to Paypal and Bitcoins.

 * Security designs: Innovations in security architectures, approaches

   and systems responding to specific emerging threats.


 * Paper submission: September 30, 2013

 * First-round notification: November 30, 2013

 * Revision: January 13, 2014

 * Final decision: March 14, 2014

 * Submission of final paper: April 14, 2014

 * Publication date: July 2014


Paper submissions for the special issue should follow the submission

format and guidelines for regular papers submitted to Journal of

Information Security and Applications (JISA). All the papers will be

peer-reviewed following the JISA reviewing procedures.


Alan Woodward

Charteris plc and University of Surrey, UK

alan.woodward (AT)

Andrew Rogoyski

Roke Manor Research Ltd, UK

andrew.rogoyski (AT)

Konrad Rieck,

University of Goettingen, Germany

konrad.rieck (AT)

Shujun Li

University of Surrey, UK

Shujun.Li (AT)


Full-Disclosure - We believe in it.


Hosted and sponsored by Secunia -

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists