posted by user: gtangil || 7900 views || tracked by 12 users: [display]

SIEM-BOOK 2012 : CALL FOR BOOK CHAPTERS: Advances in Security Information Management: Perceptions and Outcomes


When N/A
Where N/A
Abstract Registration Due May 1, 2011
Submission Deadline Jun 1, 2011
Notification Due Nov 30, 2011
Final Version Due Dec 30, 2011
Categories    security   network security   system information and event m   intrusion prevention and detec

Call For Papers

* PLEASE SHARE the appended announcement with those who may be interested.
* Thank you.

Advances in Security Information Management: Perceptions and Outcomes

Chapter proposal submission deadline June 1st, 2011 (*Extended)
Full chapter submission deadline July 1st, 2011
A book edited by Guillermo Suarez-Tangil and Esther Palomar
IT Security Group (SeTI)
Carlos III University of Madrid, Spain
Book Site:
Contact email:
To be published by Nova Science Publishers:

We are pleased to invite you to submit your chapter proposals for the contribution to the book entitled “Advances in Security Information Management: Perceptions and Outcomes” by Nova Science Publishers. Please forward this call to colleagues and those interested in security information management.

Network security is still a critical task that involves different disciplines aimed at proactively protecting, preventing, and swiftly responding to attacks. However, the classic management-related flaws still persist, e.g. the analysis of large amounts of reported intrusion alerts, whilst coexisting with novel problematic issues such as the integration of many heterogeneous sensing interfaces. Security information and event management (SIEM) then appears as the new paradigm to reconcile traditional intrusion detection systems along to recent advanced techniques such as event collection, aggregation, analysis, management and correlation. For instance, research works have recently thrived important advances on SIEM such as those to enhance any task by providing intelligent learning as well as reducing the intervention of operators significantly. Moreover, intrusion techniques are more and more sophisticated to evade detection. Additionally, privacy concerns are at stake due to the spreading use of social networks and especially because of fraud attacks as well as self-organized and hardware constrained networks still pose many security challenges in terms of networks threats since traditional approaches cannot be globally adapted.
This book brings together the most novel research findings and the latest advances in security information management as well as compiling deeply settled technologies.

This book will be useful not only for researchers, academics, developers and engineers at Universities, research centers, and in industry, but also for students in the field of security information management and its novel advances.

Recommended Topics
Original chapters on all aspects of security information management are invited. Submissions must not duplicate work that any of the authors has published elsewhere or submitted in parallel to any other conference or workshop with proceedings. Topics may include, but are not limited to, the following:
* System information and event management (SIEM).
* Intrusion prevention and detection mechanisms.
* Wireless intrusion prevention systems.
* Intrusion detection evasion techniques and tactics.
* Feature extraction methods.
* Malware behavior analysis.
* Network behavior analysis.
* Host and network-based intrusion prevention.
* Fully distributed intrusion detection approaches.
* Real-time adaptive security.
* SIEM hardware.
* SIEM, risk analysis and assessment.
* Data aggregation and log management.
* Intrusion event and alert correlation.
* Digital evidences and forensics.
* Security in self-organized and hardware constrained networks: MANETs, WSNs, VANETs, etc.
* SIEM in P2P networks.
* SIEM and Privacy.
* Privacy Enhancing Technologies.
* Privacy and Identity Management.
* SIEM and Social Networks.
* SIEM and Game Theory.
* SIEM in pervasive and ubiquitous scenarios.
* Economic fraud.
* Data loss prevention.
* Applied steganography to SIEM.
* Applied cryptograph to SIEM.
* Applied Artificial Intelligence to SIEM.

Submission Procedure
Researchers and practitioners are invited to submit on or before June 1th 2011, a 2-3 pages chapter proposal clearly explaining the mission and concerns of the proposed chapter. Authors should include a brief biography including full name, affiliation, and position, tentative title and abstract, as well as recent publications. The web site is dedicated to the development of this handbook and submissions will be received through easyChair system liked on the aforementioned site. Authors of accepted proposals will be notified by June 30th, 2011, about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by October 1st, 2011. Final camera ready will be due December 30th, 2011.
Chapter contributions should be 7,500-10,000 words each. All submitted chapters will be reviewed on a double-blind review bases. Therefore, the manuscript should be anonymous without author(s), affiliations, acknowledgements, nor obvious references.
Submission of a chapter for review would imply the commitment of the author(s) to publish the chapter in this book. Early submission is highly appreciated as the editors would like to have progressive dialogue and work with prospective authors to bring out a book of wide appeal. Authors of accepted chapters would be required to sign an agreement of copyright transfer and an originality statement with the publisher.

Guest editors
Guillermo Suárez-Tangil. Carlos III University of Madrid (Spain).
Esther Palomar. Carlos III University of Madrid (Spain).

Nova Science Publishers, Inc.
400 Oser Avenue, Suite 1600
Hauppauge, NY, 11788, United States
Tel: +631 231 7269
Fax: +631 231 8175

Important Dates
June 1th, 2011 (*Extended): Chapter Proposal Submission Deadline.
June 30th, 2011: Notification of Acceptance.
October 1st, 2011: Full Chapter Submission.
November 30th, 2011: Reviewers Comments.
December 30th, 2011: Camera-Ready Chapter Submission.

Please do not hesitate to contact us if you have any enquires. We look forward to receiving your proposal.
Yours sincerely,
The editors

Related Resources

Edited Book in Springer-Verlag 2022   Call for Book Chapters-Machine Learning and Deep Learning for Time Series Processing and Analysis
BIOS 2022   8th International Conference on Bioinformatics & Biosciences
SEN 2022   Social Epidemic Network (SEN), Call for Book Chapters
DNLP 2023   4th International Conference on Data Mining and NLP
WebGPUGems 2023   Edited Book: Call for Book Chapters (WebGPU Gems) - WebGPU API
IJITMC 2022   The International Journal of Information Technology, Modeling and Computing
EWDE 2022   Call for Book Chapters: Empowering Women in the Digital Economy
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
ART DESIGN BOOK 2022   Call for Book Chapter
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi