[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH72viga68SGge6XSzeAySAHMm93NMY4g3mKiCb0Am=dBqe83g@mail.gmail.com>
Date: Fri, 9 Aug 2013 14:45:04 +0200
From: Źmicier Januszkiewicz <gauri@....by>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Special Issue "Threat Detection,
Analysis and Defense" of JISA
Hmm, this dates back to 2011. Any news so far? I certainly didn't hear
about either Elsevier, ACM, or IEEE going down on their knees begging... It
still does look like nothing has changed despite all those people saying
their NO.
2013/8/9 Justin C. Klein Keane <justin@...irish.net>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Yes, yes, it is very common:
>
> http://www.crypto.com/blog/copywrongs/
>
> Justin C. Klein Keane
> http://www.MadIrish.net
>
> Any digital signature on this message can be confirmed using
> the GPG key at http://www.madirish.net/gpgkey
>
> On 08/09/2013 06:08 AM, Bart van Tuil wrote:
> > I am shocked, i am. ... Is this common practice?!
> >
> >
> >
> > Alex, vrijdag 9 augustus 2013 10:51
> >
> > Elsevier sells the journals to universities for crazy amounts (the
> > top 10 from university of karlsruhe can be seen here
> > http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with
> > 20000 Euro beeing the most expensive one). Althought you submit
> > your paper for free (or even pay for "corrections").
> >
> > Please consider boycotting Elsevier (like these guys
> > http://www.economist.com/node/21545974).
> >
> > Doing the right thing > impact factor.
> >
> >
> >
> > Am 2013-08-09 09:26, schrieb Konrad Rieck:
> >
> > CALL FOR PAPERS
> >
> >
> >
> > Special Issue on Threat Detection, Analysis and Defense
> >
> > Journal of Information Security and Applications
> >
> >
> >
> > Please consider the following opportunity to submit and publish
> >
> > original scientific results to a special issue of the Journal of
> >
> > Information Security and Applications (Elsevier) on "Threat
> > Detection,
> >
> > Analysis and Defense"
> >
> >
> >
> > The submission deadline is September 30, 2013.
> >
> >
> >
> > http://bit.ly/13ku0Ga
> >
> > http://ees.elsevier.com/jisa/
> >
> >
> >
> >
> >
> > TOPICS
> >
> >
> >
> > This special issue is intended to bring forth the recent
> > advancements
> >
> > in the detection, modeling, monitoring, analysis and defense of
> >
> > various threats posed to sensitive data and security systems from
> >
> > unauthorized or other inappropriate access. Areas to be covered
> >
> > include but are not limited to:
> >
> >
> >
> > * Monitoring: Novel tools and techniques for monitoring mounting
> > threats
> >
> > including monitoring of ongoing attacks.
> >
> > * Detection solutions: Innovations in the detection of intrusions,
> >
> > malware and its activity, including post-attack forensics.
> >
> > * Infrastructure: Improvements in network traffic security analysis
> > for
> >
> > identification of threats.
> >
> > * Threat modelling: Advances in the tools, technologies and
> > processes
> >
> > used in anticipating attacks.
> >
> > * Emergent problems: New threats resulting from new business models
> > for
> >
> > transfer of value, from gold-farming to Paypal and Bitcoins.
> >
> > * Security designs: Innovations in security architectures,
> > approaches
> >
> > and systems responding to specific emerging threats.
> >
> >
> >
> >
> >
> > IMPORTANT DATES
> >
> >
> >
> > * Paper submission: September 30, 2013
> >
> > * First-round notification: November 30, 2013
> >
> > * Revision: January 13, 2014
> >
> > * Final decision: March 14, 2014
> >
> > * Submission of final paper: April 14, 2014
> >
> > * Publication date: July 2014
> >
> >
> >
> >
> >
> > SUBMISSION DETAILS
> >
> >
> >
> > Paper submissions for the special issue should follow the
> > submission
> >
> > format and guidelines for regular papers submitted to Journal of
> >
> > Information Security and Applications (JISA). All the papers will
> > be
> >
> > peer-reviewed following the JISA reviewing procedures.
> >
> >
> >
> >
> >
> > GUEST EDITORS
> >
> >
> >
> > Alan Woodward
> >
> > Charteris plc and University of Surrey, UK
> >
> > alan.woodward (AT) surrey.ac.uk
> >
> >
> >
> > Andrew Rogoyski
> >
> > Roke Manor Research Ltd, UK
> >
> > andrew.rogoyski (AT) roke.co.uk
> >
> >
> >
> > Konrad Rieck,
> >
> > University of Goettingen, Germany
> >
> > konrad.rieck (AT) uni-goettingen.de
> >
> >
> >
> > Shujun Li
> >
> > University of Surrey, UK
> >
> > Shujun.Li (AT) surrey.ac.uk
> >
> >
> >
> > _______________________________________________
> >
> > Full-Disclosure - We believe in it.
> >
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
> >
> >
> >
> > _______________________________________________ Full-Disclosure -
> > We believe in it. Charter:
> > http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
> > sponsored by Secunia - http://secunia.com/
> >
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.13 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>
> iPwEAQECAAYFAlIE3/4ACgkQkSlsbLsN1gA5aQb8CDQgYiwUJFoiWHFRLsiA8ADZ
> pTISEi5zuAp2COZJd9Wjlu+dc/2HEPG2xcHHJ00DB6X5doNti1ubc0nBfeZy6A9A
> CCQfjJHUiw25NrFvmoEpayXvDrkIHLdqER/jVa1IT0ep8j6rIugAT6gp5h5xuMst
> FiQtl6VtxxCwLqqeI3BS+AhOiFHaGUZrbLEkGoM8GZciq3BpsiHiAselIjRBaHP8
> eH8+iI6Hl89vkH53NuuCMdvUFifyy9TV8hZc8ZMC4nlu+eZAu+GA9nqNpJULNOl6
> WDqJGG+o5iZWrB2Acg4=
> =QQJ+
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists