Special issue on “Applications of machine learning techniques to intrusion detection and digital forensics”

Download Special issue on “Applications of machine learning techniques to intrusion detection and digital forensics”

Post on 06-Jul-2016

212 views

Category:

Documents

0 download

TRANSCRIPT

CALL FOR PAPERSSpecial Issue on Applications of MachineLearning Techniques to Intrusion Detectionand Digital ForensicsThe security of computers and their networks is a majorconcern. As the computing devices becomemore pervasiveand connected (such as from personal computer running asimple desktop application to embedded systems control-ling a critical infrastructure), they face versatile andunknown threats ranging from sophisticated malwares, toless prevalent but still serious attacks like Web sitedefacement, denial of service attacks, nancial fraud andnetwork break-ins. They are both critical and costly andrequired to be detected in-time. The detection of intrusionsoften leads to the forensic investigation requiring theacquisition of massive volume of data and their analysis.The manual effort to deal with the problems is costly andtime consuming and thus, brings the need of machinelearning techniques that are often used to efciently andreliably perform this labour intensive work.In this special issue, we plan to present the cutting edgeresearch focusing on intrusion detection and digitalforensics with the application of machine learningtechniques. The Journal is soliciting submissions basedon an open call for papers covering areas that are includedbut not limited to the following,Detection of known or unknown exploitable vulnerabilities,Detection of known or unknown attacks,Deception systems and honeypots,Smart phone and Digital Forensics,Network and host intrusion detectionAnomaly and specication-based approachesApplication securitySpam, botnets, viruses, malwaresWeb securityLog analysisForensic analysis of large datasetsOnline forensic analysisForensic analysis of social networks3D forensic scene model generation and analysisNetwork forensicsData acquisitionINSTRUCTIONS TO AUTHORS:We solicit previously unpublished, original researchpapers. The conference papers with signicant improve-ment will also be considered, provided that authors haveclearly identify the improvements in the paper and alsohighlight the changes to their previous paper.The guidelines for prospective authors can be found athttp://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122/homepage/ForAuthors.html. Prospective authors shouldsubmit their papers online at http://mc.manuscriptcentral.com/scn and no email submissions will be accepted. Whensubmitting the papers, the authors should make sure tochoose Manuscript type as Special Issue, in theJournals Manuscript Central website, and enter RunningHead and Special Issue title as SCN-SI-038 andMachine Learning, respectively.IMPORTANT DATES:Submission deadline: 15 August 2011Acceptance notication: 30 December 2011Final papers due: 15 February 2012Publication: 2012 (Tentative)GUEST EDITORS:Dr. Ajith AbrahamCentre for Quantiable Quality of Service in Com-munication Systems,Norwegian Centre of Excellence,Norwegian University of Science and Technology,Norwayajith.abraham@ieee.orgA/Prof. Anjali SardanaDepartment of Electronics and Computer EngineeringIndian Institute of TechnologyRoorkee, Indiaanjlsfec@iitr.ac.inProf. ManPyo HongGraduate School of Information and CommunicationAjou University,Suwon, South Koreamphong@ajou.ac.krDr. Irfan AhmedInformation Security Institute,Queensland University of TechnologyBrisbane, Australiairfan.ahmed@qut.edu.auDr. Rafael AccorsiDepartment of Telematics,University of Freiburg, Germany.rafael.accorsi@iig.uni-freiburg.deSECURITY AND COMMUNICATION NETWORKSSecurity Comm. Networks 2011; 4:e1Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.344Copyright 2011 John Wiley & Sons, Ltd.

Recommended

View more >