Full Disclosure mailing list archives
Re: Special Issue "Threat Detection, Analysis and Defense" of JISA
From: "Justin C. Klein Keane" <justin () madirish net>
Date: Fri, 09 Aug 2013 08:26:41 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, yes, it is very common: http://www.crypto.com/blog/copywrongs/ Justin C. Klein Keane http://www.MadIrish.net Any digital signature on this message can be confirmed using the GPG key at http://www.madirish.net/gpgkey On 08/09/2013 06:08 AM, Bart van Tuil wrote:
I am shocked, i am. ... Is this common practice?! Alex, vrijdag 9 augustus 2013 10:51 Elsevier sells the journals to universities for crazy amounts (the top 10 from university of karlsruhe can be seen here http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with 20000 Euro beeing the most expensive one). Althought you submit your paper for free (or even pay for "corrections"). Please consider boycotting Elsevier (like these guys http://www.economist.com/node/21545974). Doing the right thing > impact factor. Am 2013-08-09 09:26, schrieb Konrad Rieck: CALL FOR PAPERS Special Issue on Threat Detection, Analysis and Defense Journal of Information Security and Applications Please consider the following opportunity to submit and publish original scientific results to a special issue of the Journal of Information Security and Applications (Elsevier) on "Threat Detection, Analysis and Defense" The submission deadline is September 30, 2013. http://bit.ly/13ku0Ga http://ees.elsevier.com/jisa/ TOPICS This special issue is intended to bring forth the recent advancements in the detection, modeling, monitoring, analysis and defense of various threats posed to sensitive data and security systems from unauthorized or other inappropriate access. Areas to be covered include but are not limited to: * Monitoring: Novel tools and techniques for monitoring mounting threats including monitoring of ongoing attacks. * Detection solutions: Innovations in the detection of intrusions, malware and its activity, including post-attack forensics. * Infrastructure: Improvements in network traffic security analysis for identification of threats. * Threat modelling: Advances in the tools, technologies and processes used in anticipating attacks. * Emergent problems: New threats resulting from new business models for transfer of value, from gold-farming to Paypal and Bitcoins. * Security designs: Innovations in security architectures, approaches and systems responding to specific emerging threats. IMPORTANT DATES * Paper submission: September 30, 2013 * First-round notification: November 30, 2013 * Revision: January 13, 2014 * Final decision: March 14, 2014 * Submission of final paper: April 14, 2014 * Publication date: July 2014 SUBMISSION DETAILS Paper submissions for the special issue should follow the submission format and guidelines for regular papers submitted to Journal of Information Security and Applications (JISA). All the papers will be peer-reviewed following the JISA reviewing procedures. GUEST EDITORS Alan Woodward Charteris plc and University of Surrey, UK alan.woodward (AT) surrey.ac.uk Andrew Rogoyski Roke Manor Research Ltd, UK andrew.rogoyski (AT) roke.co.uk Konrad Rieck, University of Goettingen, Germany konrad.rieck (AT) uni-goettingen.de Shujun Li University of Surrey, UK Shujun.Li (AT) surrey.ac.uk _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iPwEAQECAAYFAlIE3/4ACgkQkSlsbLsN1gA5aQb8CDQgYiwUJFoiWHFRLsiA8ADZ pTISEi5zuAp2COZJd9Wjlu+dc/2HEPG2xcHHJ00DB6X5doNti1ubc0nBfeZy6A9A CCQfjJHUiw25NrFvmoEpayXvDrkIHLdqER/jVa1IT0ep8j6rIugAT6gp5h5xuMst FiQtl6VtxxCwLqqeI3BS+AhOiFHaGUZrbLEkGoM8GZciq3BpsiHiAselIjRBaHP8 eH8+iI6Hl89vkH53NuuCMdvUFifyy9TV8hZc8ZMC4nlu+eZAu+GA9nqNpJULNOl6 WDqJGG+o5iZWrB2Acg4= =QQJ+ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Special Issue "Threat Detection, Analysis and Defense" of JISA Konrad Rieck (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Bart van Tuil (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Justin C. Klein Keane (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Źmicier Januszkiewicz (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Georgi Guninski (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Bart van Tuil (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)