posted by organizer: cdp || 398 views || tracked by 3 users: [display]

ISMR 2022 : ITTI Special Issue on Information Security Methodology and Replication Studies

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/itit/html
 
When N/A
Where N/A
Submission Deadline Nov 15, 2021
Notification Due Dec 20, 2021
Final Version Due Mar 8, 2022
Categories    security   computer science   information technology   networking
 

Call For Papers

– Call for Papers –

it - Information Technology

Special Issue on

Information Security Methodology and Replication Studies

it - Information Technology is a strictly peer-reviewed scientific journal. It is the oldest German journal in the field of information technology. Today, the major aim of it - Information Technology is highlighting issues on ongoing newsworthy areas in information technology and informatics and their application. It aims at presenting the topics with a holistic view. It addresses scientists, graduate students, and experts in industrial research and development.

https://www.degruyter.com/journal/key/ITIT/html

Guest Editors:

Steffen Wendzel
Worms University of Applied Sciences, Germany /
FernUniversität in Hagen, Germany
wendzel@hs-worms.de

Luca Caviglione
Inst. Appl. Math. & Inf. Techn.,
National Research Council (CNR), Italy
luca.caviglione@ge.imati.cnr.it

Aleksandra Mileva
University Goce Delcev, Macedonia
aleksandra.mileva@ugd.edu.mk

Jean-Francois Lalande
CentraleSupélec / Inria, France
jean-francois.lalande@irisa.fr

Wojciech Mazurczyk
Warsaw University of Technology, Poland
w.mazurczyk@tele.pw.edu.pl


Background & Call for Manuscripts

It is a trend of recent years that the scientific community started to foster the discussion on fundamentals of information security. These fundamentals include several important aspects such as the unified description of attacks and countermeasures, the reproducibility of experiments and means to achieve reproducibility, the sharing of research data and code, the discussion of quality criteria for experiments and the design and implementation of testbeds.
The related academic publications contributed to the advancement of information security research, e.g., by making research contributions easier to compare. Moreover, work on terminology and taxonomy addressed redundancies and unified the understanding between different sub-domains of information security.
This special issue desires to foster the progress in research on the scientific methodology of information security, to improve the links between sub-domains of information security research and to advance the discussion on the scientific methodology in information security. Moreover, this special issue welcomes submissions that address aspects of higher education in information security and works that evaluate existing research results by reproducing experiments.

Topics of interest include, but are not limited to:

• Data collection and measurement in information security research.
• Work that reproduces existing experiments, i.e., that confirms/disproves experimental results or that shows how replication platforms can be realized in information security.
• Work that discusses the underlying criteria for the design and evaluation for cyber security research testbeds.
• Provision of novel testbeds that advance the understanding of information security sub-fields, e.g., by using visual analytics or by automating steps previously conducted manually.
• Evaluation of the novelty of research contributions and handling of scientific re-inventions.
• Methodology in network security, cryptography, information hiding, IoT security, system security, digital forensics, and other sub-disciplines of information security.
• Methodology for privacy, information sharing and collaborative work in the context of information security.
• Advanced methods and evaluations of approaches in teaching information security in higher education.
• Submissions that present shared information security research infrastructure, e.g., multi-national/multi-institutional testbeds or frameworks.
• Scientometric/bibliometric analyses, e.g., citation behavior, in information security.


Submission Due: 15th November 2021
First Review Notification: 20th December 2021
Revision Due: 20th January 2021
Second Review Notification: 8th March 2022

Related Resources

EI-CFAIS 2021   2021 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2021)
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
IWSMR 2021   3rd International Workshop on Information Security Methodology and Replication
ICCSEA 2021   11th International Conference on Computer Science, Engineering and Applications
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
CAIML 2022   3rd International Conference on Artificial Intelligence and Machine Learning
AutonomousVehicles 2022   Special Issue - Autonomous Vehicles for Public Transportation Services
ECRM 2022   21st European Conference on Research Methodology for Business and Management Studies
EMSA 2022   11th International Conference on Embedded Systems and Applications