posted by user: conwubiko || 4718 views || tracked by 12 users: [display]

SACND 2011 : Call for Book Chapters: Situational Awareness in Computer Network Defense: Principles, Methods and Applications

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=216a3334-f89b-4bd3-9681-208c67e34285
 
When Nov 15, 2010 - Sep 15, 2011
Where To be published by IGI Global
Submission Deadline Dec 15, 2010
Notification Due Jan 15, 2011
Final Version Due Jun 15, 2011
Categories    computer   security   information assurance   computer network defense
 

Call For Papers

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: December 15, 2010
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
A book edited by Cyril Onwubiko and Thomas Owens
Research Series Ltd, London, UK
Brunel University, London, UK

To be published by IGI Global: http://www.igi-global.com/AuthorsEditors/AuthorEditorResources/CallForBookChapters/CallForChapterDetails.aspx?CallForContentId=216a3334-f89b-4bd3-9681-208c67e34285

Introduction
Computer crimes around the world cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT), that are responsible for ensuring availability, integrity and confidentiality of network services. Their primary challenge is to maintain situational awareness over many critical network objects some of which include critical national infrastructures, the impact of a cyber attack on which could result in a breakdown in national communications networks or essential support services, which may impact on citizens’ safety or livelihoods. Maintaining consistent high-level situational awareness over such objects requires that the CSIRT has the knowledge and ability to perceive and analyze situations that may have security related implications, make sound decisions on how to protect organizations' valued assets and offer accurate predictions of future states in a dynamic and complex environment. This is the underpinning of situational awareness in computer network defence.

Computer Network Defence (CND) is a growing field which is geared towards measures to protect and defend information, computers and networks from attacks that could cause disruption, denial of service, degradation and destruction. Situational awareness (SA) is described as knowing what is going on around you and within that knowledge of your surroundings and being able to identify which events in those surroundings are important. SA is very complex and involves very dynamic states, e.g. of a computer network with hundreds of network objects (firewalls, IDSes, routers, switches, servers, PADs etc). Maintaining a consistently high level of situational awareness over these objects can be challenging.

Objective of the Book
This book will provide security practitioners, academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations, for situational awareness in computer networks. The book will present situational awareness solutions in computer network defence (CND) currently being researched or deployed in book chapters contributed by leading researchers and practitioners in the field. The key objective is to fill a gap that exists in the way CND and security is being approached by formalizing the use of situational awareness in computer network security and defence. This will be achieved by providing contributions to situational awareness in network security and CND made through research, the prescription of formal concepts, and implementations. The book will supplement chapters on the theoretical (research) aspects of situational awareness in CND with discussion of their real-world implications and where applicable their implementations. The theoretical chapters will be complemented by chapters that address existing solutions for situational awareness in CND and the issues associated with them.

Target Audience
The primary audience for the book is professionals, practitioners, researchers and academics working in the field of Situational Awareness for Computer Network Defence which is evolving rapidly and growing as an area of information assurance. Practitioners and managers working in information security areas across all industries could significantly improve their knowledge and understanding of critical technical human and social aspects of situational awareness, and information security in general, by reading this book. Air Space Controllers, Aviation Systems and Defence Agencies will also find this book a very helpful and practical resource.

Recommended topics include, but are not limited to the following:

• Theoretical Underpinnings of Situational Awareness
• Analysis of Situational Awareness in Computer Networks
• Functional Requirements of Situational Awareness for Computer Network Security
• Situational Assessment and Human Factors
• Situational Assessment and Decision Marking
• Situational Understanding in Command and Control Networks (CCN)
• Situational Awareness in Military Operations
• Situational Awareness in C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
• Computer Network Defence (CND)
• Computer Network Operations
• Usefulness of Data Fusion for Security Incident Analysis
• Security incident analysis - Data Association and Correlation
• Security Information Visualization
• Security Monitoring
• Implementing Situational Awareness Systems
• Emerging Applications of Situational Awareness Solutions
• Incident Response and Management and Emergency Preparedness
• Computer Security Incident Response Teams (CSIRT)
• Information Security Metrics and Measurement
• Digital Forensics
• Forensics and Investigation Issues
• Digital Forensic Information Analysis
• Enterprise Information Security Policies, Standards and Procedures
• Risk Management, Governance and Compliance
• National and Critical Infrastructure Security Issues
• Trust, Privacy and Anonymity Issues
• Application Security, Audits and Penetration Testing
• Information Security
• Risk Assessment & Management
• Information Security Management Frameworks
• Security Event and Information Management
• Risks posed by Wireless Networks, including through the use of Mobile Computing, Smartphones & Apps in a CND environment.


Submission Procedure
Researchers and practitioners are invited to submit on or before November 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by December 15, 2011 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by March 15, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This book is anticipated to be released in 2011.

Important Dates
December 15, 2010: Proposal Submission Deadline
January 15, 2011: Notification of Acceptance
March 15, 2011: Full Chapter Submission
May 15, 2011: Review Results to Authors
July 15, 2011: Final Chapter Submission
August 15, 2011: Final Deadline



Inquiries and submissions can be forwarded electronically (Word document) or by mail to:

Dr. Cyril Onwubiko
Research Series Ltd
1 Meadway, Woodford, London, IG8 7RF, UK
Tel.: +44 (0) 7974 112418
E-mail: cyril.onwubiko@research-series.com
http://www.research-seeries.com
Personal: www.research-series.com/cyril


Dr. Thomas Owens
School of Engineering, Brunel University
Room H234, Uxbridge, Middlesex UB8 3PH, UK
Tel.: +44 (0) 1895 266608 • Fax: +44 (0) 1895 232806
E-mail: thomas.owens@brunel.ac.uk
http://www.brunel.ac.uk

Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ACMC 2017   Australasian Computer Music Conference
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
NCUL 2018   Call For Book Chapters: Natural Computing for Unsupervised Learning Springer (USA)
AI 2017   3rd International Conference on Artificial Intelligence and Applications
CALL FOR BOOK CHAPTERS 2018   Transformative Power of Mobile Phones and Social Media Use in Developing Countries.
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities