posted by user: conwubiko || 5013 views || tracked by 12 users: [display]

SACND 2011 : Call for Book Chapters: Situational Awareness in Computer Network Defense: Principles, Methods and Applications


When Nov 15, 2010 - Sep 15, 2011
Where To be published by IGI Global
Submission Deadline Dec 15, 2010
Notification Due Jan 15, 2011
Final Version Due Jun 15, 2011
Categories    computer   security   information assurance   computer network defense

Call For Papers

Proposal Submission Deadline: December 15, 2010
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
A book edited by Cyril Onwubiko and Thomas Owens
Research Series Ltd, London, UK
Brunel University, London, UK

To be published by IGI Global:

Computer crimes around the world cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT), that are responsible for ensuring availability, integrity and confidentiality of network services. Their primary challenge is to maintain situational awareness over many critical network objects some of which include critical national infrastructures, the impact of a cyber attack on which could result in a breakdown in national communications networks or essential support services, which may impact on citizens’ safety or livelihoods. Maintaining consistent high-level situational awareness over such objects requires that the CSIRT has the knowledge and ability to perceive and analyze situations that may have security related implications, make sound decisions on how to protect organizations' valued assets and offer accurate predictions of future states in a dynamic and complex environment. This is the underpinning of situational awareness in computer network defence.

Computer Network Defence (CND) is a growing field which is geared towards measures to protect and defend information, computers and networks from attacks that could cause disruption, denial of service, degradation and destruction. Situational awareness (SA) is described as knowing what is going on around you and within that knowledge of your surroundings and being able to identify which events in those surroundings are important. SA is very complex and involves very dynamic states, e.g. of a computer network with hundreds of network objects (firewalls, IDSes, routers, switches, servers, PADs etc). Maintaining a consistently high level of situational awareness over these objects can be challenging.

Objective of the Book
This book will provide security practitioners, academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations, for situational awareness in computer networks. The book will present situational awareness solutions in computer network defence (CND) currently being researched or deployed in book chapters contributed by leading researchers and practitioners in the field. The key objective is to fill a gap that exists in the way CND and security is being approached by formalizing the use of situational awareness in computer network security and defence. This will be achieved by providing contributions to situational awareness in network security and CND made through research, the prescription of formal concepts, and implementations. The book will supplement chapters on the theoretical (research) aspects of situational awareness in CND with discussion of their real-world implications and where applicable their implementations. The theoretical chapters will be complemented by chapters that address existing solutions for situational awareness in CND and the issues associated with them.

Target Audience
The primary audience for the book is professionals, practitioners, researchers and academics working in the field of Situational Awareness for Computer Network Defence which is evolving rapidly and growing as an area of information assurance. Practitioners and managers working in information security areas across all industries could significantly improve their knowledge and understanding of critical technical human and social aspects of situational awareness, and information security in general, by reading this book. Air Space Controllers, Aviation Systems and Defence Agencies will also find this book a very helpful and practical resource.

Recommended topics include, but are not limited to the following:

• Theoretical Underpinnings of Situational Awareness
• Analysis of Situational Awareness in Computer Networks
• Functional Requirements of Situational Awareness for Computer Network Security
• Situational Assessment and Human Factors
• Situational Assessment and Decision Marking
• Situational Understanding in Command and Control Networks (CCN)
• Situational Awareness in Military Operations
• Situational Awareness in C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance)
• Computer Network Defence (CND)
• Computer Network Operations
• Usefulness of Data Fusion for Security Incident Analysis
• Security incident analysis - Data Association and Correlation
• Security Information Visualization
• Security Monitoring
• Implementing Situational Awareness Systems
• Emerging Applications of Situational Awareness Solutions
• Incident Response and Management and Emergency Preparedness
• Computer Security Incident Response Teams (CSIRT)
• Information Security Metrics and Measurement
• Digital Forensics
• Forensics and Investigation Issues
• Digital Forensic Information Analysis
• Enterprise Information Security Policies, Standards and Procedures
• Risk Management, Governance and Compliance
• National and Critical Infrastructure Security Issues
• Trust, Privacy and Anonymity Issues
• Application Security, Audits and Penetration Testing
• Information Security
• Risk Assessment & Management
• Information Security Management Frameworks
• Security Event and Information Management
• Risks posed by Wireless Networks, including through the use of Mobile Computing, Smartphones & Apps in a CND environment.

Submission Procedure
Researchers and practitioners are invited to submit on or before November 15, 2010, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by December 15, 2011 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by March 15, 2011. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit This book is anticipated to be released in 2011.

Important Dates
December 15, 2010: Proposal Submission Deadline
January 15, 2011: Notification of Acceptance
March 15, 2011: Full Chapter Submission
May 15, 2011: Review Results to Authors
July 15, 2011: Final Chapter Submission
August 15, 2011: Final Deadline

Inquiries and submissions can be forwarded electronically (Word document) or by mail to:

Dr. Cyril Onwubiko
Research Series Ltd
1 Meadway, Woodford, London, IG8 7RF, UK
Tel.: +44 (0) 7974 112418

Dr. Thomas Owens
School of Engineering, Brunel University
Room H234, Uxbridge, Middlesex UB8 3PH, UK
Tel.: +44 (0) 1895 266608 • Fax: +44 (0) 1895 232806

Related Resources

ICCV 2019   International Conference on Computer Vision
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
DSN 2019   Dependable Systems and Networks
CyberSA 2019   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2019)
NECO 2018   7th International Conference of Networks and Communications
DSTAA 2019   Taylor and Francis - DSTAA 2019 : Call for Book Chapters - Data Science: Theory, Analysis, and Applications
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IJCSITCE 2018   The International Journal of Computational Science, Information Technology and Control Engineering
(Book Chapter) 2018   Call for IGI-Global Book Chapter Proposals: ‘‘Virtual Reality Techniques’’