posted by organizer: spathan || 1036 views || tracked by 6 users: [display]

SAIE_Book-CRC 2019 : Security Analytics for Internet of Everything

FacebookTwitterLinkedInGoogle

Link: https://mohi1257.wixsite.com/security
 
When N/A
Where USA
Abstract Registration Due Dec 30, 2018
Submission Deadline Mar 30, 2019
Notification Due Apr 30, 2019
Final Version Due May 30, 2019
Categories    security   internet of everything   analytics   networking
 

Call For Papers

CALL FOR CHAPTERS (CFC)

Security Analytics for Internet of Everything
To be published by CRC Press, Taylor & Francis, USA

Editors:
Mohiuddin Ahmed, PhD
Abu Barkat, PhD
Al-Sakib Khan Pathan, PhD

URL: https://mohi1257.wixsite.com/security

About the Book

Internet is making our daily life as digital as possible and this new era is called Internet of Everything (IoE). While it creates new opportunities, it also presents a fundamental challenge related to security of the environment. To establish secure connections among people, process, data and things, security needs to be ubiquitous. The physical and cyber security must work collaboratively to protect the networks, applications, devices, data and users which are the building blocks of IoE. Due to the increase in connected devices, big data and automation, system data need to be processed as securely as possible. The increased connectivity will create more room for the cyber criminals to exploit the system’s vulnerabilities. In fact, even in today’s dynamic threat environment, the role of security is evolving, becoming increasingly complex and especially, considered a critical factor for any successful business. According to Cisco, 65% of companies could not prevent the breach even with the state-of-the-art prevention mechanisms while 33% organizations took more than 2 years to identify a breach! As expected, around 52% of the organizations lost reputation due to a breach. Therefore, to secure the IoE, it is imperative to use a holistic approach. There is a clear need of collaborative work throughout the entire value chain of the network. In this context, this book will address the Security Analytics for Internet of Everything, which will provide a big picture on the concepts, techniques, applications, and open research directions in this area. In addition, the proposed book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation cyber security.

Topics of interest are but not limited to:
- Introduction to Internet of Everything (IoE)
- Application Security
- Endpoint and Sensor Security
- Infrastructure and Cloud Security
- Operational Security
- Security Strategy
- Security Architecture
- IT Governance and Risk Management
- Usage of Blockchain for Cyber Security
- Industry 4.0 and Cyber Security
- Futuristic Applications and Challenges

Submission Instructions

Each manuscript should be written in a tutorial manner with enough details so that it can be easily accessible to the readers outside the specialty of the area. Expected manuscript length is between 7,000 to 12,000 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (doc or docx). Kindly do not use any special formatting or macro for the submission version, doc or docx file.

General guideline is: Use A4 page with 1 inch (or, 2.54 cm) margin on all sides, single column format, 1.5 line spacing with 10 point sized font, Times New Roman. References should be cited within the text with numbers in sequence like [1], [2], [3], .... An all-in-one PDF file may be submitted for the initial version however, if the chapter is accepted, this formatting style must be followed and MS-Office file (doc, docx) must be supplied.

A chapter proposal (1-2 page including probable Table of Contents and Affiliation, Contacts) should be sent to the editor as soon as possible. Please email to all the editors. See email addresses below ( m.ahmed.au@ieee.org , abu.barkat@cit.edu.au , sakib.pathan1@gmail.com).

Important Dates

Proposal Submission Deadline: December 30th 2018
Notification of Proposal Acceptance: January 15th 2019
Draft of Full Chapter Submission: March 30th 2019
Notification for Corrections: April 30th 2019
Final Chapter Submission: May 30th 2019

Delivery of full content of the book to the publisher: August 30th, 2019 (or, before)

Editors' Contact Information

Mohiuddin Ahmed, PhD
Center for Cyber Security and Games,
Canberra Institute of Technology,
Block D, Room 241,
37 Constitution Avenue, Reid, ACT 2601, Australia
Tel: +612-62078769
Email: m.ahmed.au@ieee.org

Abu Barkat, PhD
Centre for Cyber Security and Games,
Canberra Institute of Technology,
Block D, Room 139,
37 Constitution Avenue, Reid, ACT 2601, Australia
Tel: +612-62074078
Email: abu.barkat@cit.edu.au

Al-Sakib Khan Pathan, PhD
Department of Computer Science and Engineering
Southeast University
A.R. Tower, 24 Kemal Ataturk Avenue, Banani, Dhaka 1213, Bangladesh
Phone: (Office) +8809821590 Ex. 115 (Mobile) +8801756084583
Email: sakib.pathan1@gmail.com

Related Resources

CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
Securtiy Analytics 2019   Call for Chapters: Security Analytics for Internet of Everything (IoE) to be published by CRC Press, USA
AISCA 2019   3rd International Conference on Artificial Intelligence, Soft Computing And Applications
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
SIPM 2019   7th International Conference on Signal Image Processing and Multimedia
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
DataViz&Science@ILRN 2019   Special Track on Data Visualization and Engaging Science @ ILRN 2019
MoWIN 2019   8th International Conference on Mobile & Wireless Networks
CNSA 2019   12th International Conference on Security and its Applications