[Corpora-List] Call for Book Chapters - Information Assurance and Security

From: Ajith Abraham (ajith.abraham@ieee.org)
Date: Mon Mar 13 2006 - 04:40:28 MET

  • Next message: Mark Stevenson: "[Corpora-List] Second CFP: COLING/ACL workshop "Information Extraction Beyond the Document""

    --------------------------------------------------------
    Call for Chapters (Springer SCI Series)
    -------------------------------------------------------

    * Computational Intelligence in Information Assurance and Security *

    Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (Eds.)

    The global economic infrastructure is becoming increasingly dependent
    upon information technology, with computer and communication
    technology being essential and vital components of Government
    facilities, power plant systems, medical infrastructures, financial
    centres and military installations to name a few. Finding effective
    ways to protect information systems, networks and sensitive data
    within the critical information infrastructure is challenging even
    with the most advanced technology and trained professionals.

    This volume is intended to be published by Springer and targeted to
    provide the academic and industrial community a medium for presenting
    original research and applications related to information assurance
    and security using computational intelligence techniques. Authors are
    invited to submit (see instructions for authors) their original and
    unpublished work that communicates current research on information
    assurance and security regarding both the theoretical and
    methodological aspects, as well as various applications in solving
    real world information security problems. The topics of interest
    include, but not limited to:

    Authentication
    Data protection
    Computer forensics
    Internet and web security
    Information and data integrity
    Intrusion detection
    Information warfare and cyber-attacks
    Security models and architectures
    Secure software engineering
    Cryptography and coding
    Cryptographic and E-commerce protocols
    Agent and mobile code security
    Security in sensor networks
    Biometrics
    Key management
    Wireless and ad hoc network security
    Information security management
    Database and system security

    The time schedule for this publication is as follows:

    Manuscript submission: April 21, 2006 (some extensions might be possible!)
    Authors Notification: June 30, 2006
    Camera-ready submission: July 28, 2006

    If you intend to contribute to this book, please send an e-mail to
    nadia@eng.uerj.br with a copy to ajith.abraham@ieee.org informing the
    title of the chapter and its abstract.

    More information online at:
    http://www.softcomputing.net/ciias/

    Journal of Information Assurance and Security (JIAS)
    http://www.softcomputing.net/jias/



    This archive was generated by hypermail 2b29 : Mon Mar 13 2006 - 04:40:19 MET