Full Disclosure mailing list archives
Re: Special Issue "Threat Detection, Analysis and Defense" of JISA
From: Georgi Guninski <guninski () guninski com>
Date: Fri, 9 Aug 2013 20:12:41 +0300
On Fri, Aug 09, 2013 at 10:08:50AM +0000, Bart van Tuil wrote:
I am shocked, i am. ... Is this common practice?!
i heard it is common practice to transfer the copyright to a journal just they have _something_ to sell. basically you receive pennies (unless you are screwed to pay for the pleasure) and they bill per view. maybe this is explained by the quote: "a society of dumb (pseudo) scientists deserves a government of wolves".
Alex, vrijdag 9 augustus 2013 10:51 Elsevier sells the journals to universities for crazy amounts (the top 10 from university of karlsruhe can be seen here http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with 20000 Euro beeing the most expensive one). Althought you submit your paper for free (or even pay for "corrections"). Please consider boycotting Elsevier (like these guys http://www.economist.com/node/21545974). Doing the right thing > impact factor. Am 2013-08-09 09:26, schrieb Konrad Rieck: CALL FOR PAPERS Special Issue on Threat Detection, Analysis and Defense Journal of Information Security and Applications Please consider the following opportunity to submit and publish original scientific results to a special issue of the Journal of Information Security and Applications (Elsevier) on "Threat Detection, Analysis and Defense" The submission deadline is September 30, 2013. http://bit.ly/13ku0Ga http://ees.elsevier.com/jisa/ TOPICS This special issue is intended to bring forth the recent advancements in the detection, modeling, monitoring, analysis and defense of various threats posed to sensitive data and security systems from unauthorized or other inappropriate access. Areas to be covered include but are not limited to: * Monitoring: Novel tools and techniques for monitoring mounting threats including monitoring of ongoing attacks. * Detection solutions: Innovations in the detection of intrusions, malware and its activity, including post-attack forensics. * Infrastructure: Improvements in network traffic security analysis for identification of threats. * Threat modelling: Advances in the tools, technologies and processes used in anticipating attacks. * Emergent problems: New threats resulting from new business models for transfer of value, from gold-farming to Paypal and Bitcoins. * Security designs: Innovations in security architectures, approaches and systems responding to specific emerging threats. IMPORTANT DATES * Paper submission: September 30, 2013 * First-round notification: November 30, 2013 * Revision: January 13, 2014 * Final decision: March 14, 2014 * Submission of final paper: April 14, 2014 * Publication date: July 2014 SUBMISSION DETAILS Paper submissions for the special issue should follow the submission format and guidelines for regular papers submitted to Journal of Information Security and Applications (JISA). All the papers will be peer-reviewed following the JISA reviewing procedures. GUEST EDITORS Alan Woodward Charteris plc and University of Surrey, UK alan.woodward (AT) surrey.ac.uk Andrew Rogoyski Roke Manor Research Ltd, UK andrew.rogoyski (AT) roke.co.uk Konrad Rieck, University of Goettingen, Germany konrad.rieck (AT) uni-goettingen.de Shujun Li University of Surrey, UK Shujun.Li (AT) surrey.ac.uk _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Special Issue "Threat Detection, Analysis and Defense" of JISA Konrad Rieck (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Bart van Tuil (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Justin C. Klein Keane (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Źmicier Januszkiewicz (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Georgi Guninski (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Bart van Tuil (Aug 09)
- Re: Special Issue "Threat Detection, Analysis and Defense" of JISA Alex (Aug 09)