[Om-announce] Deadline Approaching Sept 30: Call for Book Chapters: Springer Book on Versatile Cyber-security

Gaurav Somani gaurav at curaj.ac.in
Mon Sep 25 11:37:30 CEST 2017


Apologies if you have received multiple copies of the same CFP.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*Book Title: Versatile Cybersecurity *

Link: http://spritz.math.unipd.it/CFP/2017/
<http://spritz.math.unipd.it/CFP/2017/>

Series:
Advances in Information Security

Publisher:
Springer International Publishing

Editors:
Mauro Conti, University of Padua, Italy
Gaurav Somani, Central University of Rajasthan, India
Radha Poovendran, University of Washington, USA

Important Dates:
1. Chapter proposals due date: Sept 30, 2017
2. Notification of acceptance of proposals: October 30, 2017
3. Full chapter submission: December 30, 2017
4. Chapter reviews feedback due date: January 25, 2018 (Each chapter will
be reviewed by two/three experts to ensure the quality of work)
5. Camera-ready submission of revised chapters due date: February 15, 2018
6. Manuscript delivery to the publisher: February 28, 2018


Introduction:
Cyber security research is one of the hot area in the computer science
domain which also plays a major role in the life of almost every
individual, enterprise, society and country. After the IT revolution, an
unprecedented growth has been seen in cyber-attacks and their impact in
terms of financial damages and data losses. A steady growth is also visible
in the newer forms of attacks with sophistication, stealth, scale and
intelligent penetration. Cyber-attacks also necessitates continuous and
unified efforts on designing defensive mechanisms to combat the range of
evolving attacks and minimizing the damages incurred by various attacks.
Cyber security as a discipline is also able to attract a good number of
young minds opting to study and divulge into this area. There is a range of
online and print resources available to study various research topics,
relevant contributions and open problems related to cyber security.

A large number of advanced security books focus on either cryptography or
system security which covers both information and network security.
However, there is hardly any text available for advanced students and
research scholars in security research to systematically study how the
major attacks are studied, modeled, planned and combated by the community.
The proposed book will fill this gap by creating a scholarly value if
focused content related to specific attacks or attack families irrespective
of the attack target or victim application is provided. These dedicated
discussions (in the form of individual chapters) may cover the application
or area specific aspects while discussing about the placement of defense
solutions to combat the attacks. We envision this book to have 12 to 15
high quality invited chapters which address important attacks from
theoretical (modeling) as well as practical aspects.

This edited book can really become a great resource if each chapter brings
a comprehensive and structured information about an attack or an attack
family. We plan to present crisp detailing on the state of the art with
quality illustration of defense mechanisms and open research problems. An
example list of widely studied attacks/ attack families are given below.
Many of these attack families have common characteristics with other
families in this list. However, their isolated study of attacks and defense
mechanisms is equally important and needed to bring its real and salient
properties into discussion. As editors, we would like to bring a necessary
balance between the commonality and the independent identity by bringing
the required coverage.

Book Type:
The book will have edited chapters focusing on cyber security attacks and
defense mechanisms.

Aim and Scope:
The major aim of this book is to provide a comprehensive base to the recent
research and open problems in the area of cyber security research. We have
felt that it is the much-needed ingredient to the researchers/ scholars who
are about to start their research in the emerging area. State of the art
problems, present solutions, and open research directions will always be
positively welcomed by all the research groups, post-graduate programs,
Doctoral programs around the globe in computer science and information
technology.

Target Group:
This book will provide a comprehensive aid to prospective researchers and
scholars who are considering working in this area. Being an emerging area,
cyber security and related aspects have become a matter of extreme interest
of budding researchers in the area. This book is aimed to provide a
complete sketch towards all the research areas, recent works and open
research problems in security research. Collecting and streamlining all
these works in a single book requires large collaborative efforts from the
community across the globe. This has also been envisaged that this book
will continue to become a source of large interest for the time to come and
would require adaptations time to time.

Suggested Topics:
The book aims to systematically collect and present quality research
findings in the area of recent advances in cyber security area to give wide
benefit to a huge community of researchers, educators, practitioners and
industries. We provide a typical list of chapters coverage which may also
include other suitable attacks/attack families. Submissions are solicited
on the following topics, but not limited to:
1. Denial of Service Attacks
2. Social Engineering Attacks
3. Vulnerable Software Attacks
4. Side Channel Attacks
5. Data Breach Attacks
6. Brute Force Attacks
7. Financial Attacks
8. Malware Attacks
9. Drive-by- Download and Advertising
10. Covert Channels
11. Insider Attacks
12. Sophisticated Attacks
13. Spoofing/Impersonation Attacks
14. Reflection and Amplification Attacks

Proposal Submission:
Prospective authors should submit a 2-3 page proposal explaining the attack
family, impact, attack launch, and various solutions. In order to have
uniformity of the text and meet the predicted objectives of the book, each
chapter in this edited book may follow the following structure:
1. Detailed introduction to the attack irrespective of the application
area.
2. Impact on various domains/Statistics
3. Launch of the attack
4. Reasons for the success of this attack
5. Solutions from the literature with a systematic classification
6. New flavors/sophistication
7. Possible research directions

Manuscript guidelines:
http://www.springer.com/gp/authors-editors/book-authors-edit
ors/book-manuscript-guidelines


Contact Information:
Mauro Conti (Corresponding Editor, conti[AT]math[dot]unipd[dot]it),
Security and Privacy Research Group, Department of Mathematics, University
of Padua, Italy.
Gaurav Somani (gaurav[AT]curaj[dot]ac[dot]in), Department of Computer
Science and Engineering, Central University of Rajasthan, India.
Radha Poovendran (rp3[AT]uw[dot]edu), Department of Electrical Engineering,
University of Washington, USA


===================================================
Gaurav Somani,
Assistant Professor,
Department of Computer Science and Engineering,
School of Engineering and Technology, Central University of Rajasthan,
(Established under the Central Universities Act 2009)
NH-8, Kishangarh, Ajmer, Rajasthan, India.
===================================================
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openmath.org/pipermail/om-announce/attachments/20170925/762c03a1/attachment.html>


More information about the Om-announce mailing list