Full Disclosure mailing list archives

Re: Special Issue "Threat Detection, Analysis and Defense" of JISA


From: Źmicier Januszkiewicz <gauri () tut by>
Date: Fri, 9 Aug 2013 14:45:04 +0200

Hmm, this dates back to 2011. Any news so far? I certainly didn't hear
about either Elsevier, ACM, or IEEE going down on their knees begging... It
still does look like nothing has changed despite all those people saying
their NO.


2013/8/9 Justin C. Klein Keane <justin () madirish net>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, yes, it is very common:

http://www.crypto.com/blog/copywrongs/

Justin C. Klein Keane
http://www.MadIrish.net

Any digital signature on this message can be confirmed using
the GPG key at http://www.madirish.net/gpgkey

On 08/09/2013 06:08 AM, Bart van Tuil wrote:
I am shocked, i am.  ... Is this common practice?!



Alex, vrijdag 9 augustus 2013 10:51

Elsevier sells the journals to universities for crazy amounts (the
top 10 from university of karlsruhe can be seen here
http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with
20000 Euro beeing the most expensive one). Althought you submit
your paper for free (or even pay for "corrections").

Please consider boycotting Elsevier (like these guys
http://www.economist.com/node/21545974).

Doing the right thing > impact factor.



Am 2013-08-09 09:26, schrieb Konrad Rieck:

CALL FOR PAPERS



Special Issue on Threat Detection, Analysis and Defense

Journal of Information Security and Applications



Please consider the following opportunity to submit and publish

original scientific results to a special issue of the Journal of

Information Security and Applications (Elsevier) on "Threat
Detection,

Analysis and Defense"



The submission deadline is September 30, 2013.



http://bit.ly/13ku0Ga

http://ees.elsevier.com/jisa/





TOPICS



This special issue is intended to bring forth the recent
advancements

in the detection, modeling, monitoring, analysis and defense of

various threats posed to sensitive data and security systems from

unauthorized or other inappropriate access.  Areas to be covered

include but are not limited to:



* Monitoring: Novel tools and techniques for monitoring mounting
threats

including monitoring of ongoing attacks.

* Detection solutions: Innovations in the detection of intrusions,

malware and its activity, including post-attack forensics.

* Infrastructure: Improvements in network traffic security analysis
for

identification of threats.

* Threat modelling: Advances in the tools, technologies and
processes

used in anticipating attacks.

* Emergent problems: New threats resulting from new business models
for

transfer of value, from gold-farming to Paypal and Bitcoins.

* Security designs: Innovations in security architectures,
approaches

and systems responding to specific emerging threats.





IMPORTANT DATES



* Paper submission: September 30, 2013

* First-round notification: November 30, 2013

* Revision: January 13, 2014

* Final decision: March 14, 2014

* Submission of final paper: April 14, 2014

* Publication date: July 2014





SUBMISSION DETAILS



Paper submissions for the special issue should follow the
submission

format and guidelines for regular papers submitted to Journal of

Information Security and Applications (JISA). All the papers will
be

peer-reviewed following the JISA reviewing procedures.





GUEST EDITORS



Alan Woodward

Charteris plc and University of Surrey, UK

alan.woodward (AT) surrey.ac.uk



Andrew Rogoyski

Roke Manor Research Ltd, UK

andrew.rogoyski (AT) roke.co.uk



Konrad Rieck,

University of Goettingen, Germany

konrad.rieck (AT) uni-goettingen.de



Shujun Li

University of Surrey, UK

Shujun.Li (AT) surrey.ac.uk



_______________________________________________

Full-Disclosure - We believe in it.

Charter: http://lists.grok.org.uk/full-disclosure-charter.html

Hosted and sponsored by Secunia - http://secunia.com/





_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iPwEAQECAAYFAlIE3/4ACgkQkSlsbLsN1gA5aQb8CDQgYiwUJFoiWHFRLsiA8ADZ
pTISEi5zuAp2COZJd9Wjlu+dc/2HEPG2xcHHJ00DB6X5doNti1ubc0nBfeZy6A9A
CCQfjJHUiw25NrFvmoEpayXvDrkIHLdqER/jVa1IT0ep8j6rIugAT6gp5h5xuMst
FiQtl6VtxxCwLqqeI3BS+AhOiFHaGUZrbLEkGoM8GZciq3BpsiHiAselIjRBaHP8
eH8+iI6Hl89vkH53NuuCMdvUFifyy9TV8hZc8ZMC4nlu+eZAu+GA9nqNpJULNOl6
WDqJGG+o5iZWrB2Acg4=
=QQJ+
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: