posted by user: cdp || 4193 views || tracked by 1 users: [display]

JUCS-ISMRE 2020 : JUCS Special Issue on Information Security Methodology, Replication Studies and Information Security Education

FacebookTwitterLinkedInGoogle

Link: http://www.jucs.org/ujs/jucs/info/special_issues/JUCS_Information_Security_Methodology_2020_CfP.pdf
 
When N/A
Where N/A
Submission Deadline Jan 20, 2019
Categories    security   computer science   communications   communications
 

Call For Papers

================================================================
Call for Papers

Journal of Universal Computer Science (J.UCS), www.jucs.org

Special Issue on Information Security Methodology, Replication Studies
and Information Security Education

-Impact Factor: 1.066-

http://www.jucs.org/ujs/jucs/info/special_issues/JUCS_Information_Security_Methodology_2020_CfP.pdf

================================================================


Important Deadlines

Submission by: 20 Jan 2020
Notification of authors by: 30 Apr 2020
Revised submission by: 10 Aug 2020
Notification about final decision by: 30 Nov 2020

================================================================

Guest Editors:

Steffen Wendzel, Hochschule Worms / Fraunhofer FKIE, Germany
(Corresponding Guest Editor)

Luca Caviglione, National Research Council of Italy (CNR), Italy

Alessandro Checco, University of Sheffield, United Kingdom

Aleksandra Mileva, University Goce Delcev, Macedonia

Jean-Francois Lalande, CentraleSupélec, France

Wojciech Mazurczyk, Warsaw University of Technology, Poland


================================================================

Background & Call for Manuscripts

In recent years, research started to focus on the scientific
fundamentals of information security. These fundamentals include several
important aspects such as the unified description of attacks and
countermeasures, the reproducibility of experiments and means to achieve
reproducibility, the sharing of research data and code, the discussion
of quality criteria for experiments and the design and implementation of
testbeds.
The related academic publications contributed to the advancement of
information security research, e.g. by making research contributions
easier to compare. Moreover, work on terminology and taxonomy addressed
redundancies and unified the understanding between different sub-domains
of information security.
This special issue desires to foster the progress in research on the
scientific methodology of information security, to improve the links
between sub-domains of information security research and to advance the
discussion on the scientific methodology in information security.
Moreover does this special issue welcome submissions that address
aspects of higher education in information security and submissions that
evaluate existing research results by reproducing experiments.


Topics of interest include, but are not limited to:

Data collection and measurement in information security research.
Work that reproduces existing experiments, i.e. that confirms/disproves
experimental results or that shows how replication platforms can be
realized in information security.
Work that discusses the underlying criteria for the design and
evaluation for cyber security research testbeds.
Provision of novel testbeds that advance the understanding of
information security sub-fields, e.g. by using visual analytics or by
automating steps previously conducted manually.
Evaluation of the novelty of research contributions and handling of
scientific re-inventions.
Methodology in network security, cryptography, information hiding, IoT
security, system security, digital forensics, and other sub-disciplines
of information security.
Methodology for privacy, information sharing and collaborative work in
the context of information security.
Advanced methods and evaluations of approaches in teaching information
security in higher education.
Submissions that present shared information security research
infrastructure, e.g. multi-national/multi-institutional testbeds or
frameworks.
Scientometric/bibliometric analyses, e.g. citation behavior, in
information security.

This special issue on Information Security Methodology and Replication
Studies is linked with the 1st International Workshop on Information
Security Methodology and Replication Studies (IWSMR 2019) held in
conjunction with the 14th International Conference on Availability,
Reliability and Security (ARES) in Canterbury, UK. Both, new research
papers and selected papers from the IWSMR'19 workshop are invited for
submission to this special issue.

Submission and Evaluation Procedure

The Journal of Universal Computer Science is a high-quality electronic
publication that deals with all aspects of computer science. J.UCS has
been appearing monthly since 1995 and is thus one of the oldest
electronic journals with uninterrupted publication since its foundation.
A number of special issues as well as the printed archive editions of
the volumes are also available in print and can be ordered directly from
J.UCS office. The impact factor of J.UCS is 1.066, the 5-year impact
factor 0.863 (2017). For further information, please refer to:

http://www.jucs.org/jucs_info/aims/unique_features.html

Manuscripts must be submitted in PDF format, written in English and
should not exceed 20 pages. Papers only prepared according to the JUCS’s
guidelines for authors and submitted online (see procedure described
below) will be included in the review process. Illustrations and tables
must be provided as integrated parts of the manuscript.

The guidelines for authors are available at:

http://www.jucs.org/ujs/jucs/info/submissions/style_guide.html

Only novel research papers which are currently not under review at
another event or a journal are accepted for the review process. For more
details, please also refer to:

http://www.jucs.org/ujs/jucs/info/special_issues/special_guidelines.html

For all potential authors who have received an invitation for an
extended version of their IWSMR’19 paper, please bear in mind that we
can only consider submissions which are significantly extended (at least
50 percent new material and the title of the extended version must
clearly and unmistakably differ from the title of the article presented
at the conference).

Please submit your original and proof-read papers not later than 20 Jan
2020 using the following submission link:

https://easychair.org/conferences/?conf=jucsismre2020

Each paper will be reviewed by at least 3 reviewers. According to the
covered main subjects in the content, a selected set of reviewers with
the appropriate expertise will be assigned.

Related Resources

AVC 2020   Advances in Vision Computing: An International Journal
JUCS Special Issue 2020   JUCS Pattern Recognition and Artificial Intelligence - Current Challenges, Novel Solutions and Emerging Applications
GreeNet Symposium - SGNC 2020   11th Symposium on Green Networking and Computing (SGNC 2020)
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
ACM-WCBD-Ei/Scopus 2020   2020 International Conference on Wireless Communication and Big Data (WCBD 2020)
IEEE HotICN--Ei, scopus 2020   2020 3rd IEEE International Conference on Hot Information-Centric Networking (IEEE HotICN 2020)--Ei Compendex, scopus
IEEE-CTISC 2020   2020 2nd International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2020)
ICNT--Ei Compendex and Scopus 2020   2020 3rd International Conference on Network Technology (ICNT 2020)--Ei Compendex, Scopus
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
IEEE-CVIV 2020   2020 2nd International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2020)