Emerging Technologies for Cybersecurity
EURASIP Journal on Information Security welcomes submissions to the special issue on ‘Emerging Technologies for Cybersecurity’.
Contemporary societies are becoming more and more dependent on open networks such as the internet where commercial activities, business transactions and government services are realized. This has led to the rapid development of new cyber threats and information security issues which are utilized by cyber criminals. Mistrust of telecommunications and computer network technologies can tremendous socio-economic impacts on global enterprises as well as individuals.
Moreover, the occurrence of international fraud often require investigations that cross national boundaries that are subject to different and often conflicting jurisdictions and legal systems. The increased complexity of communication and networking infrastructure is making the prevention of cyber-crimes increasingly difficult, requiring new and innovative approaches to cyber-security.
Potential topics include but are not limited to:
- Cyber-crime science
- New approaches for cyber-crime detection/prevention
- Information and network security
- Network traffic analysis and modelling for cyber-crime science
- Digital forensics
- Information hiding solutions (steganography, watermarking) for network traffic
- Network attacks & anomalies detection and prevention
- Protocols, systems, computer and security
- Steganography/steganalysis and covert/subliminal channels
- Artificial Intelligence (AI) based or game theory techniques for cyber-crimes detection
- Security architectures
- New approaches to cybersecurity e.g. nature- or bio-inspired cybersecurity
- Moving Target Defense (MTD) techniques
- Measurements for network incidents response, investigation and evidence handling
- Measurements for network anomalies detection
- Measurements for economics of cybersecurity
Papers must be written in English and describe original research not published or currently under review by other journals or conferences. All relevant papers submitted will go through an external review process.
Selected best papers of the IWCC 2016 (International Workshop on Cyber Crime) can be submitted to this special issue. There should however be at least 30% difference between the extended/revised paper and the workshop paper, and will undergo the same rigorous peer review process as other submissions to this special issue.
Before submitting your manuscript, please ensure you have carefully read the submission guidelines for EURASIP Journal on Information Security. The complete manuscript should be submitted through the EURASIP Journal on Information Security submission system. To ensure that you submit to the correct thematic series please select the appropriate thematic series in the drop-down menu upon submission. In addition, indicate within your cover letter that you wish your manuscript to be considered as part of the thematic series on ‘Emerging Technologies for Cybersecurity'. All submissions will undergo rigorous peer review and accepted articles will be published within the journal as a collection.
Deadline for submissions: 30 November, 2016
Lead Guest Editor
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Maciej Korczyński, Delft University of Technology, The Netherlands
Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Artur Janicki, Warsaw University of Technology, Poland
Submissions will also benefit from the usual advantages of open access publication:
- Rapid publication: Online submission, electronic peer review and production make the process of publishing your article simple and efficient
- High visibility and international readership in your field: Open access publication ensures high visibility and maximum exposure for your work - anyone with online access can read your article
- No space constraints: Publishing online means unlimited space for figures, extensive data and video footage
- Authors retain copyright, licensing the article under a Creative Commons license: articles can be freely redistributed and reused as long as the article is correctly attributed
For editorial enquiries please contact email@example.com
Sign up to article alerts to keep updated on articles published in EURASIP Journal on Information Security - including articles published in this thematic series!