[aims-announce] IEEE TNSM Special Issue on Cybersecurity - Submission Deadline: June 14th, 2019 (extended)

Rémi Badonnel remi.badonnel at loria.fr
Fri May 17 09:36:07 CEST 2019


CALL FOR PAPERS
IEEE TNSM SPECIAL ISSUE ON CYBERSECURITY TECHNIQUES FOR MANAGING 
NETWORKED SYSTEMS
https://www.comsoc.org/publications/journals/ieee-tnsm/cfp

-----------------------------------

Submission Deadline: *June 14th, 2019 (extended)*

Dear Colleagues:

We cordially invite you to share your latest research results by 
submitting your manuscript to the IEEE Transactions on Network and 
Service Management Special Issue on "Cybersecurity Techniques for 
Managing Networked Systems".

------------------------
CALL FOR PAPERS
------------------------

As the backbone of communications amongst objects, humans, companies, 
and administrations, the Internet has become a great integration 
platform capable of efficiently interconnecting billions of entities, 
from RFID chips to data centers. This platform provides access to 
multiple hardware and virtualized resources (servers, networking, 
storage, applications, connected objects) coming from cloud computing 
and internet-of-things infrastructures. From these resources that may be 
hosted and distributed amongst different providers and tenants, the 
building and operation of complex and value-added networked systems is 
enabled.

These networked systems are, however, subject to a large variety of 
security attacks, such as distributed denial-of-service, 
man-in-the-middle, web-injection and malicious software attacks, 
orchestrated in a more or less stealthy manner through the Internet. 
While they are gaining in sophistication and coordination (i.e. advanced 
persistent threats), these attacks may affect the fundamental security 
goals of confidentiality, integrity, availability and non-repudiation of 
resources. The accessibility, distribution, and increased complexity of 
networked systems make them particularly vulnerable targets. In that 
context, cybersecurity techniques offer new perspectives for protecting 
these networked systems, through the elaboration of intelligent and 
efficient management methods for detecting, analyzing and mitigating 
such attacks.

Given the strong interest in both industry and academia in this area, 
this special issue aims at the timely publication of recent innovative 
research results on cybersecurity methods and techniques for managing 
networked systems. We welcome submissions addressing the important 
challenges (see the non-exhaustive list of topics below) and presenting 
novel research or experimentation results. Survey papers that offer a 
perspective on related work and identify key challenges for future 
research will be considered as well. We look forward to your submissions!

------------------------
ABOUT THE SPECIAL ISSUE
------------------------

Topics of interest for this special issue, include, but are not limited 
to the following:

• Network and service management for security
• Security of network and service management
• Security management architecture, protocols and APIs
• Secure and resilient design and deployment of networked systems
• Monitoring and detection of threats and attacks
• Artificial intelligence, machine learning for cyber-security
• Analytics and big data for security management
• Modeling for security management
• Configuration and orchestration of security mechanisms
• Algorithms for security management
• Security automation, policy-based management
• NFV-based security functions and services
• Security of programmable components
• Chaining and orchestration of security functions
• Distributed security management
• Intrusion detection, tolerance, and prevention
• Resilience against large-scale distributed attacks
• Trust and identity management
• Verification and enforcement of security properties
• Vulnerability prevention and remediation
• Performance of security management
• Security of cloud applications and services
• Security of data-center infrastructures
• Security of 5G networks and services
• Security of smart environments
• Security of Internet of Things
• Security of SCADA, industrial and health networks
• Security of SDN- and NFV-based systems
• Network forensics, auditing and responses to incidents
• Privacy-preserving solutions for cybersecurity
• Detailed experience reports from experimental testbeds
• Blockchains for security management
• Security-related business, regulation and legal aspects

------------------------
SUBMISSION FORMAT
------------------------

Papers will be evaluated based on their originality, presentation, 
relevance and contribution to the field of management of 
software-defined virtualized systems, as well as their overall quality 
and suitability for the special issue. The submitted papers must be 
written in good English and describe original research which has not 
been published nor currently under review by other journals or 
conferences. Previously published conference papers should be clearly 
identified by the authors at the initial submission stage and an 
explanation should be provided of how such papers have been extended in 
order to be considered for this special issue.

Author guidelines for preparation of the manuscript can be found at:
http://www.comsoc.org/tnsm/author-guidelines
For more information, please contact Remi Badonnel (remi.badonnel at loria.fr).

------------------------
SUBMISSION GUIDELINES
------------------------

All manuscripts and any supplementary material should be submitted 
through the IEEE ManuscriptCentral service located at: 
http://mc.manuscriptcentral.com/tnsm
Authors must indicate in the submission cover letter that their 
manuscript is intended for the “Cybersecurity Techniques for Managing 
Networked Systems” special issue.

------------------------
IMPORTANT DATES
------------------------

Paper submission date: *June 14th, 2019 (extended)*
Notification of acceptance: September 1st, 2019
Publication date*: March 1st, 2020

------------------------
GUEST EDITORS
------------------------

Rémi Badonnel, Telecom Nancy – LORIA / INRIA, France
Carol Fung, Virginia Commonwealth University, United States
Sandra Scott-Hayward, Queen's University Belfast, United Kingdom
Qi Li, Tsinghua University, China

(* online published version will be available in IEEE Xplore after the 
camera ready version has been submitted with final DOI)

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ifi.uzh.ch/pipermail/aims-announce/attachments/20190517/c8ca914a/attachment.html>


More information about the aims-announce mailing list