lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <FE5838B9-1848-4A1F-A36F-6F822347560D@uni-goettingen.de>
Date: Fri, 9 Aug 2013 09:26:35 +0200
From: Konrad Rieck <konrad.rieck@...-goettingen.de>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Special Issue "Threat Detection,
	Analysis and Defense" of JISA

CALL FOR PAPERS

Special Issue on Threat Detection, Analysis and Defense 
Journal of Information Security and Applications 

Please consider the following opportunity to submit and publish
original scientific results to a special issue of the Journal of
Information Security and Applications (Elsevier) on "Threat Detection,
Analysis and Defense"

The submission deadline is September 30, 2013.

http://bit.ly/13ku0Ga
http://ees.elsevier.com/jisa/


TOPICS

This special issue is intended to bring forth the recent advancements
in the detection, modeling, monitoring, analysis and defense of
various threats posed to sensitive data and security systems from
unauthorized or other inappropriate access.  Areas to be covered
include but are not limited to:

 * Monitoring: Novel tools and techniques for monitoring mounting threats
   including monitoring of ongoing attacks.
 * Detection solutions: Innovations in the detection of intrusions,
   malware and its activity, including post-attack forensics.
 * Infrastructure: Improvements in network traffic security analysis for
   identification of threats.
 * Threat modelling: Advances in the tools, technologies and processes
   used in anticipating attacks.
 * Emergent problems: New threats resulting from new business models for
   transfer of value, from gold-farming to Paypal and Bitcoins.
 * Security designs: Innovations in security architectures, approaches
   and systems responding to specific emerging threats.


IMPORTANT DATES

 * Paper submission: September 30, 2013
 * First-round notification: November 30, 2013
 * Revision: January 13, 2014
 * Final decision: March 14, 2014
 * Submission of final paper: April 14, 2014
 * Publication date: July 2014


SUBMISSION DETAILS

Paper submissions for the special issue should follow the submission
format and guidelines for regular papers submitted to Journal of
Information Security and Applications (JISA). All the papers will be
peer-reviewed following the JISA reviewing procedures.


GUEST EDITORS

Alan Woodward
Charteris plc and University of Surrey, UK
alan.woodward (AT) surrey.ac.uk

Andrew Rogoyski 
Roke Manor Research Ltd, UK
andrew.rogoyski (AT) roke.co.uk

Konrad Rieck, 
University of Goettingen, Germany
konrad.rieck (AT) uni-goettingen.de

Shujun Li
University of Surrey, UK
Shujun.Li (AT) surrey.ac.uk

-- 
Prof. Dr. Konrad Rieck
Computer Security Group, University of Göttingen
http://www.sec.cs.uni-goettingen.de






Download attachment "smime.p7s" of type "application/pkcs7-signature" (4936 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ