« National Geographic and Changemakers anounce Geotourism Innivation CompetitionOpen Society Institute's Open Society Fellowship »

Call for papers- Computer Science Journals

27/03/09

Permalink 03:24:06 pm, by ninette Email , 278 words   English (UK)
Categories: Call for proposals

Call for papers- Computer Science Journals

The mission of the Computer Science Journals (CSC Journals) http://www.cscjournals.org is to serve society through excellence in education, research, service and to generate new knowledge and technology for the benefit of everyone ranging from the academic and professional research communities to industry practitioners in a range of topics in computer sciences and engineering in general and computer security, biometrics and bioinformatics, image processing and signal processing. All journals under CSS seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding computer science and engineering fields.

Below is the list of the journals offered by CSC Journals:

International Journal of Computer Science and Security (ISSN: 1985-1553)
International Journal of Engineering (ISSN: 1985-2312)
International Journal of Security (ISSN: 1985-2320)
International Journal of Image Processing (ISSN: 1985-2304)
Signal Processing: An International Journal (ISSN: 1985-2339)
International Journal of Biometric and Bioinformatics (ISSN: 1985-2347)

Important Dates
Paper Submission: March 31, 2009
Author Notification: April 15, 2009
Journal Publication: May, 2009

CSC Journals is seeking to establish a new International Editorial Board for the next three years. CSC Journals would like to invite the interested professionals to contribute into CSC research network by joining as reviewer or as a part of editorial committee. The minimum eligibility is to have PhD in any area that is covered in the journals under CSC Journals. Benefits to the position will then be emailed upon successful signup. Please remember that it is through the effort of volunteers such as yourself that CSC Journals continues to grow and flourish. Your help with reviewing the issues reviewed by prospective reviewers would be very much appreciated.

9 comments

Comment from: IJCSI [Visitor] · http://www.ijcsi.org
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.


==========================================================================
CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - August 2009 - Security Systems and Technologies (Volume 2)
ISSN: 1694-0784

Submission Deadline: 31st July 2009
Acceptance Notification:19th August 2009
Online Publication: 31st August 2009

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.


Formal aspects of security; Security analysis methodologies; Security verification; Security protocols; Security architectures and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software design security; Middleware security; Security for nomadic code; Intrusion detection systems; Static analysis for software security; Security modeling

Identity management; Security law enforcement; PKI; PKI Key management; Incident response planning; Intrusion detection and event correlation; Firewalls; Trust management; Software security assurance

Secure protocols; Applied cryptography; Smart cards; Biometrics; Digital rights management; Electronic surveillance; Database security

Internet security; Security in wireless; Sensor/cellular network security; Ad hoc network security; Security in peer-to-peer networks; Security in wireless multimedia systems; Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.); Security of emergency services

Information hiding; Anonymity; Authentication; Data Integrity; Security data mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service discovery; Secure location-based service; Information survivability

Threat taxonomies and modeling; Security threats; Threats propagation; Anti-malware technologies; Engineering anti-malware; Anti-virus, anti-spyware, anti-phishing; Malware propagation models; Profiling security information; Vulnerability analysis and countermeasures; Denial of service attacks; Measurements and metrics; Testing samples and techniques; Quarantine/reuse decisions; Anti-malware tool performance; Anti-malware tool suites; Open-source anti-malware; Host-based anti-malware; On-line anti-malware scanning

Messaging, viruses, spyware; Advanced misuse detection techniques /machine learning, natural language processing, challenge-response, etc./; Message filtering, blocking, authentication; Digital signatures; Generalized spamming /over email, Internet telephony, instant messaging, mobile phone, phishing, etc. /; Spam compression and recognition; Learning misuse patterns; Payment schemes; Economics of generalized spam; Tracking abuse tactics and patterns; Protecting legitimate use patterns; Methods for testing protection robustness; Costs and benefits of messaging use and misuse; Standards for messaging and misuse reporting; Legal aspects /identity theft, privacy, freedom of speech, etc./

Fundamentals for SHS; Privacy and protection for SHS; Identify and location management in SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces for SHS; SHS for accessibility and elderly/disabled people; Real-time challenges for SHS in eHealth environments; Architectures and systems for SHS; Network technologies and protocols for SHS; Ubiquitous/pervasive platform and middleware for SHS; Services and applications for SHS; SHS on campuses and hotels; SHS for mission critical laboratories; Content protection and digital rights management for SHS; Intelligent devices, sensor network/RFID for SHS; Intrusion detection and computer forensics for SHS; SHS and Homeland security; Personal data privacy and protection in SHS; Emerging standards and technologies for SHS; Commercial and industrial for SHS; Case studies, prototypes and experience

Fundamentals on highly dynamic environments; Privacy and predefined access control dilemma; Privacy police, provisions and obligations; Dependability in dynamic environments; Protection of digital documents in dynamic environments; On-line activities in high dynamic systems; Law enforcement in high dynamic systems; Personalization; Privacy and transparency; Distributed usage control; Privacy compliance

Foundations of cryptography; Applied cryptography; Cryptanalysis; Signatures schemes and trust models; Cryptographic algorithms; Electronic payment systems; High-performance encryption methods; Group-oriented cryptography; Identity-based cryptography; Anonymous authentication; Cryptography for multi-user environments; Cryptography and secure localization systems; Attacks on cryptosystems

All submitted papers will be judged based on their quality by the reviewers committee. All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJCSI website (see http://www.ijcsi.org/authors.php).

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org
19/07/09 @ 08:40
Comment from: Fire safety Posters [Visitor] · http://www.alertall.com/
Computer Science Journals really help people of all ages in life. Poeple who have passion in journalism and its related fields.
09/09/09 @ 09:00
Comment from: Fire Safety for Kids [Visitor] · http://www.alertall.com/
I have read this one and I have caught these phrase. I really thought this will be of great help. Excellence in education, research, service and to generate new knowledge and technology for the benefit of everyone ranging from the academic and professional.
10/09/09 @ 08:42
Comment from: cheap jordan shoes [Visitor] · http://www.chinawholesale2008.com
I recently came accross your blog and have been reading along. I thought I would leave my

first comment. I dont know what to say except that I have enjoyed reading. Nice blog.
If you like cheap jordan shoes or you are intersting in buy jordan shoes and supra

shoes.welcome to my blog.
07/10/09 @ 11:33
Comment from: International Journal of Computer Science Issues - IJCSI [Visitor] Email · http://www.ijcsi.org
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results.


CALL FOR PAPERS International Journal of Computer Science Issues (IJCSI) - Volume 6 - November 2009 Issue

The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
See authors guide for manuscript preparation and submission guidelines.

Accepted papers will be published online and authors will be provided with printed copies and indexed by Google Scholar, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld Academic Search Engine (BASE), SCIRUS, Cornell University Library, ScientificCommons, and more.

Deadline: 31 October 2009
Notification: 17 November 2009
Online Publication: 30 November 2009


- Autonomic and autonomous systems
- Bio-technologies
- Knowledge data systems
- Mobile and distance education
- Intelligent techniques, logics, and systems
- Knowledge processing
- Information technologies
- Internet and web technologies
- Mobile Computing
- Mobility and multimedia systems
- Systems performance
- Networking and telecommunications
- Industrial systems
- Evolutionary computation
- Digital information processing
- Cognitive science and knowledge agent-based systems
- Context-aware systems - Networking technologies
- Natural Language Processing
- Speech Synthesis
- Data Mining
- Security in network, systems, and applications
- Knowledge for global defense
- Software Engineering
- Information Systems
- Software development and deployment
- Knowledge virtualization
- Systems and networks on the chip
- IPv6 Today - Technology and deployment
- Modeling
- Optimization
- Complexity

All submitted papers will be judged based on their quality by the technical committee and reviewers. Papers that describe research and experimentation are encouraged.
All paper submissions will be handled electronically and detailed instructions on submission procedure are available on IJCSI website(http://www.ijcsi.org).

For other information, please contact IJCSI Managing Editor, (editor@ijcsi.org)
Website: http://www.ijcsi.org
11/10/09 @ 00:42
Comment from: Air Jordan shoes [Visitor] · http://www.airjordan.cc
It's worth taking times to look through your blog, as you know, some of website cover many spam information, but yours is filled with connotation.
20/04/10 @ 04:07
Comment from: Cheap Jordans [Visitor] · http://www.cheapjordans.cc/
Excellent post. It was very helpful for me.I knew little in this part before,Thank you for sharing !
22/04/10 @ 03:35
Comment from: mbt [Visitor] · http://www.cheap-mbt-shoes.net
How such a good article,thanks for sharing!
28/07/10 @ 12:12
Comment from: Thirty one gifts [Visitor] · http://www.thirtyonegiftsbychristy.com
This is a great way to serve society through research, service from academic and professional aspect of the community.
10/08/10 @ 21:15

This post has 289 feedbacks awaiting moderation...

Leave a comment


Your email address will not be revealed on this site.

Your URL will be displayed.
(Line breaks become <br />)
(Name, email & website)
(Allow users to contact you through a message form (your email will not be revealed.)
This is a captcha-picture. It is used to prevent mass-access by robots.
Please enter the characters from the image above. (case insensitive)

The information published on the DIA blog is intended for project leaders at the University of Pretoria.

July 2014
Mon Tue Wed Thu Fri Sat Sun
 << <   > >>
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      

Search

XML Feeds

film izle