posted by user: wmazurczyk || 2158 views || tracked by 7 users: [display]

IEEE TDSC SI CC 2014 : IEEE Transactions on Dependable and Secure Computing Special Issue on Cyber Crime

FacebookTwitterLinkedInGoogle

Link: http://www.computer.org/cms/Computer.org/transactions/cfps/cfp_tdscsi_cc.pdf
 
When Oct 1, 2014 - Oct 1, 2014
Where none
Submission Deadline Oct 1, 2014
Notification Due Jan 10, 2015
Categories    cyber crime   cybercriminals   cyber threats   cyber warfare
 

Call For Papers

Cyber crimes reflect the evolution of criminal practices that have adapted to the world of information and communication technologies. Cybercriminality has become a curse of the modern world with the potential to affect every one nationally and/or internationally. Individuals, companies, governments and institutions may become victims as well as (involuntary) helpers of cyber criminals. The inability to provide cyber-security can potentially have a tremendous socio-economic impact on global enterprises as well as individuals.

The aim of this special issue is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of cyber crime. Prospective authors will be encouraged to submit related distinguished research papers on the subject of both: theoretical approaches and practical case reviews.

Topics of interest include, but are not limited to:
• Cyber-crime science
• Emerging cybercriminals techniques and countermeasures
• Cyber forensics and anti-forensic procedures, techniques, tools and analysis
• Cyber crime investigations & incident response
• Active and passive cyber crime defense techniques, tools and mechanisms
• Cybersecurity testbeds, tools, methodologies
• Cyber threat modeling analysis, cyber risk and vulnerability assessment
• Cyber warfare & cyber terrorism
• Cybersecurity economic modeling and metrics
• Cybersecurity standards, policy, law, and regulation
• Legal, ethical and policy issues related to cyber crime
• Human and behavioral issues in cyber crime
• Network traffic analysis and modelling for cyber crime science
• Deviant activities and crime patterns
• Insider threat detection and prevention
• Misuse of personal data and the right to online privacy

Guest Editors
- Wojciech Mazurczyk, Warsaw University of Technology, Poland
- Thomas J. Holt, School of Criminal Justice, Michigan State University, USA
- Krzysztof Szczypiorski, Warsaw University of Technology, Poland

Papers must be written in English and describe original research not published or currently under review by other journals or conferences. All relevant papers submitted will go through an external, rigorous review process. Submissions should be sent according to the instructions available at:
http://www.computer.org/portal/web/tdsc/author

Proposed schedule
- Manuscript submission: October 1st, 2014
- First notification date: January 10th, 2014
- Expected publication: 2015

Related Resources

IEEE TETC SI 2017   IEEE Transactions on Emerging Topics in Computing, Special Issue on Scholarly Big Data
BDACCIP 2017   The First International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
ICCWS 2018   13th International Conference on Cyber Warfare and Security
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
SI: IEEE Access VSB 2017   IEEE Access Special Section on Visual Surveillance and Biometrics: Practices, Challenges, and Possibilities
ICSC 2018   12th IEEE International Conference on Semantic Computing (ICSC 2018)
IEEE - ICBDA 2018   2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA 2018)--IEEE Xplore and Ei Compendex
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
ICST 2018   The 11th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2018)