Call for Papers Journal of Internet Technology (http://jit.niu.edu.tw/, Indexed by SCI-E)
Special Issue on “Behavior Data Analytics for Cybersecurity” Theme and Scope Moving towards digital nation and smart cities, cyberspace is becoming an increasingly important platform for innovation and prosperity, and the means to improve general welfare and productivity. Due to the loosely coupled and lightly regulated digital infrastructure for collaboration and sharing, greater risks and new cybersecurity challenges result. Furthermore, as the scale and complexity of this cyberspace grow, big data approach has generally been proven to be a promising direction to understand what is on-going inside, both at the macroscopic and microscopic levels. As the same time, behavior analytics, in particular using domain knowledge and semantics to assist data mining and pattern discovery, is also found to be very effective in understanding not only the transactional behavior patterns of entities in the cyberspace, but also the causations behind these patterns as well as the quantification of their cognitive experience. When these two areas are put together, it creates a promising direction to address new cybersecurity challenges. It also opens up new fundamental research questions in both fields, data analytics, and cybersecurity. This special session will include papers based on the presentation at the 18th International Conference on Information and Communications Security, ICICS 2016 (http://www.icics2016.org) and papers submitted for this call for papers. All submitted papers are subjected to the same review process as those papers accepted for publication in the regular issues.
Topics include but are not limited to: l Affective computing l Attack behavior analysis l Attribute-oriented analysis l Behavior models and theories l Behavior analytics service platform l Cognitive cyber-infrastructure l Distributed systems security l Multi-dimensional data models and optimization l Next generation security operation centre l Ontologies in behavior informatics l Risk evaluation and security l Security information and event management l Semantics for functions and behaviors l Semantics-inspired data mining and pattern discovery l Service composition, horizontal and vertical l Use cases and applications in cybersecurity analytics Instructions for Manuscripts Each paper, written in English, should be no more than 5000 Words, including references and illustrations. More information can be found at http://jit.niu.edu.tw/preparation2.php. All submitted papers will be reviewed by at leastthree reviewers and selected based on their originality, significance, relevance, and clarity of presentation. Papers extended from conference/workshop versions should be clearly stated and should have at least 30% different materialsfrom their original versions. The covering letter should indicate the names of the authors and their affiliations, addresses, faxes, and e-mails. Prospective authors should submit full manuscripts electronically by e-mail to chihung.chi@csiro.au,by January 08, 2017.
Important dates Manuscript submission deadline: January 08, 2017 Notification of Acceptance/Rejection/Revision: March 12, 2017 2nd round check: April 30, 2017 Final Manuscript Due: June 18, 2017 Tentative Publication Date: September 30, 2018 Guest Editors Dr. Chi-Hung Chi Data61/CSIRO Tasmania, Australia 7005 E-mail: chihung.chi@csiro.au
Prof. Kwok-yan Lam School of Computer Science and Engineering, Nanyang Technological Univeresity, Singapore Email: kwokyan.lam@ntu.edu.sg
Prof. Raymond Wong School of Computer Science and Engineering University of New South Wales, Sydney, Australia E-mail: wong@cse.unsw.edu.au |