top of page

Call for Papers

Description :

Modern societies have become greatly depended on cyberspace to interact, collaborate, and conduct businesses. Similarly, cybercriminals exploit the advantages provided by cyberspace to perpetrate a wide variety of cyberattacks greatly impacting on the socio-economic well-being of everyone. This special issue aims to disseminate the state-of-the-art research in cybersecurity. The special issue will focus on advanced cybersecurity techniques and applications that have the potential to ensure a safe, trustworthy, secure, and resilient cyberspace. Potential topics of interest for this special issue include, but are not limited to:

• Techniques and applications for cyberthreat modeling and analysis

• Visual analytics techniques for cybersecurity

• Advanced techniques and applications for cyber digital forensic

• Advanced techniques and applications for cybercrime detection and prevention

• Network traffic analysis and modelling for cybersecurity

• Machine learning based techniques for cybercrimes detection and prevention

• Game theory based techniques for cybercrimes detection and prevention

• Cybersecurity approaches for critical infrastructures

• Advanced frameworks for cyber security modeling and simulation test-beds

 

Important Dates: 

Paper Submission: 15 October 2015

Notification of Initial Decision: 31 February 2016

Final Manuscripts Due: 31 June 2016

Publication Date Late: 2016

 

Submission and Processing :

All papers are refereed through a peer review process. A guide for authors are available on the Author Guidelines page: http://www.cc-pe.net/journalinfo/authors.html#notes

The submissions must not have been previously published or submitted for a journal or conference publication. Submissions that have been previously published in refereed conference proceedings could be considered for publication in this special issue if they contain significant number of “new and original” ideas/contributions along with over 60% new material added to the contribution. Authors should explicitly identify where the previous version of the paper has been published (or submitted) and what this additional 60% content includes. All submitted papers will go through an initial screening process to weed out papers which are not suitable for the special issue or have different focus, papers which are marginal, weak papers, and etc. Only good and relevant papers will be processed and sent to at least TWO independent referees.

 

Editors :

Editor in Chief :

Prof. Geoffrey Fox

Digital Science Center Indiana University 815 E 10th Street Bloomington, IN 47408, USA

 

Guest Editors:

Professor Jemal Abawajy,

Deakin University, Australia

Email: abawajy@gmail.com

 

Dr. Rafiqul Islam,

School of Computing and

Leader, Cyber Security Research Group,

Charles Sturt University, Australia.

Email: mislam@csu.edu.au

bottom of page