Loading ...
Sorry, an error occurred while loading the content.

Call for Chapters on Computational Intelligence in Information Assurance and Security

Expand Messages
  • Nadia Nedjah
    Intelligent Systems Engineering Book Series (http://www.isebis.eng.uerj.br) Computational Intelligence in Information Assurance and Security Call for Chapters
    Message 1 of 1 , Dec 7, 2005
      Intelligent Systems Engineering Book Series (http://www.isebis.eng.uerj.br)

      Computational Intelligence in Information Assurance and Security
      Call for Chapters (Springer SCI Series)

      The global economic infrastructure is becoming increasingly dependent upon
      information technology, with computer and communication technology being
      essential and vital components of Government facilities, power plant
      systems, medical infrastructures, financial centres and military
      installations to name a few. Finding effective ways to protect information
      systems, networks and sensitive data within the critical information
      infrastructure is challenging even with the most advanced technology and
      trained professionals.

      This volume is intended to be published by Springer and targeted to provide
      the academic and industrial community a medium for presenting original
      research and applications related to information assurance and security
      using computational intelligence techniques. Authors are invited to submit
      (see instructions for authors) their original and unpublished work that
      communicates current research on information assurance and security
      regarding both the theoretical and methodological aspects, as well as
      various applications in solving real world information security problems.

      The topics of interest include, but not limited to:

      * Authentication
      * Data protection
      * Computer forensics
      * Internet and web security
      * Information and data integrity
      * Intrusion detection
      * Information warfare and cyber-attacks
      * Security models and architectures
      * Secure software engineering
      * Cryptography and coding
      * Cryptographic and E-commerce protocols
      * Agent and mobile code security
      * Security in sensor networks
      * Biometrics
      * Key management
      * Wireless and ad hoc network security
      * Information security management
      * Database and system security

      The time schedule for this publication is as follows:

      * Intention of contribution: February 28, 2006
      * Manuscript submission: April 21, 2006
      * Authors Notification: June 30, 2006
      * Camera-ready submission: July 28, 2006

      Book Editors

      * Nadia Nedjah - http://www.eng.uerj.br/~nadia/english.html
      * Ajith Abraham - http://www.softcomputing.net/
      * Luiza Mourelle - http://www.eng.uerj.br/~ldmm

      If you intend to contribute to this book, please send an e-mail to
      nadia@... with a copy to ajith.abraham@... informing the title
      of the chapter and its abstract before February 28, 2006.

      Looking forward to receiving your contributions.

      Nadia Nedjah

      [Non-text portions of this message have been removed]
    Your message has been successfully submitted and would be delivered to recipients shortly.