posted by organizer: cdp || 4125 views || tracked by 3 users: [display]

ISMR 2022 : ITTI Special Issue on Information Security Methodology and Replication Studies

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/itit/html
 
When N/A
Where N/A
Submission Deadline Nov 15, 2021
Notification Due Dec 20, 2021
Final Version Due Mar 8, 2022
Categories    security   computer science   information technology   networking
 

Call For Papers

– Call for Papers –

it - Information Technology

Special Issue on

Information Security Methodology and Replication Studies

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view. It addresses scientists, graduate students, and experts in industrial research and development.

https://www.degruyter.com/journal/key/ITIT/html

Guest Editors:

Steffen Wendzel
Worms University of Applied Sciences, Germany /
FernUniversität in Hagen, Germany
wendzel@hs-worms.de

Luca Caviglione
Inst. Appl. Math. & Inf. Techn.,
National Research Council (CNR), Italy
luca.caviglione@ge.imati.cnr.it

Aleksandra Mileva
University Goce Delcev, Macedonia
aleksandra.mileva@ugd.edu.mk

Jean-Francois Lalande
CentraleSupélec / Inria, France
jean-francois.lalande@irisa.fr

Wojciech Mazurczyk
Warsaw University of Technology, Poland
w.mazurczyk@tele.pw.edu.pl


Background & Call for Manuscripts

It is a trend of recent years that the scientific community started to foster the discussion on fundamentals of information security. These fundamentals include several important aspects such as the unified description of attacks and countermeasures, the reproducibility of experiments and means to achieve reproducibility, the sharing of research data and code, the discussion of quality criteria for experiments and the design and implementation of testbeds.
The related academic publications contributed to the advancement of information security research, e.g., by making research contributions easier to compare. Moreover, work on terminology and taxonomy addressed redundancies and unified the understanding between different sub-domains of information security.
This special issue desires to foster the progress in research on the scientific methodology of information security, to improve the links between sub-domains of information security research and to advance the discussion on the scientific methodology in information security. Moreover, this special issue welcomes submissions that address aspects of higher education in information security and works that evaluate existing research results by reproducing experiments.

Topics of interest include, but are not limited to:

• Data collection and measurement in information security research.
• Work that reproduces existing experiments, i.e., that confirms/disproves experimental results or that shows how replication platforms can be realized in information security.
• Work that discusses the underlying criteria for the design and evaluation for cyber security research testbeds.
• Provision of novel testbeds that advance the understanding of information security sub-fields, e.g., by using visual analytics or by automating steps previously conducted manually.
• Evaluation of the novelty of research contributions and handling of scientific re-inventions.
• Methodology in network security, cryptography, information hiding, IoT security, system security, digital forensics, and other sub-disciplines of information security.
• Methodology for privacy, information sharing and collaborative work in the context of information security.
• Advanced methods and evaluations of approaches in teaching information security in higher education.
• Submissions that present shared information security research infrastructure, e.g., multi-national/multi-institutional testbeds or frameworks.
• Scientometric/bibliometric analyses, e.g., citation behavior, in information security.


Submission Due: 15th November 2021
First Review Notification: 20th December 2021
Revision Due: 20th January 2021
Second Review Notification: 8th March 2022

Related Resources

ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
ARIA 2024   11th International Conference on Artificial Intelligence & Applications
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)