zyzhai的个人博客分享 http://blog.sciencenet.cn/u/zyzhai 泥土的芬芳

博文

中国工程院院刊《信息与电子工程前沿》网络空间安全专题征稿通知

已有 5706 次阅读 2018-4-24 12:12 |系统分类:论文交流|关键词:学者

 


中国工程院院刊FITEE

“网络空间安全”专题征稿通知

2018831截稿

 

在信息全球化的今天,网络空间也在不断发展演化,下一代互联网、移动互联网、物联网、5G网络等新型网络以及云计算、大数据、社交网络等众多新型服务模式不断涌现,网络空间已成为继陆、海、空、天之后的第五大战略空间,是影响国家安全、社会稳定、经济发展和文化传播的核心、关键和基础。在信息技术变革式和爆炸式发展趋势下,信息技术与传统行业深度融合成为大势所趋。随着信息技术发展与应用,信息安全内涵在不断延伸,从最初信息机密性发展到信息完整性、可用性、可控性和不可否认性,进而又发展为“攻(攻击)、防(防范)、测(检测)、控(控制)、管(管理)、评(评估)”等多方面基础理论和实施技术。传统安全防护主要依靠外挂式防火墙、入侵检测系统(intrusion detection system, IDS)和入侵防御系统(intrusion prevention system, IPS)等,实行以特征检测为主的网络安全监控,并基于预置规则匹配产生告警信息,这种被动式防御在应对高级持续威胁(advanced persistent threat, APT)、0-day攻击等新型网络安全威胁方面遇到极大挑战。发展新型内生安全主动防御技术,对国家关键信息基础设施和各类信息资产实施有效防护,是学术界和工业界亟需解决的问题。

 

针对以上需求,推动我国在拟态安全、关键信息基础设施网络安全、新型通信网络安全、硬件安全等领域的研究工作,为国家和区域网络安全提供先进理论和应用成果,中国工程院院刊《信息与电子工程前沿(英文)》(FITEE)邀请中国工程院邬江兴院士担任主编,筹备网络空间安全”专题


专题编委会:

主编

邬江兴教授(中国工程院院士


执行主编

李建华教授,上海交通大学

季新生教授,国家数字交换系统工程技术研究中心


编委

Jie Wu教授,美国Temple UniversityIEEE Fellow

任奎教授,浙江大学(IEEE Fellow

兰巨龙教授,国家数字交换系统工程技术研究中心

Mohammad S. Obaidat教授,美国Fordham UniversityIEEE Fellow

魏强教授,国家数字交换系统工程技术研究中心

Shiyan Hu教授,美国Michigan Technological University


联系人:

上海交通大学,伍军博士,junwuhn@sjtu.edu.cn

FITEE编辑部:翟自洋,jzus_zzy@zju.edu.cn


专题学科范畴、文章类型、投稿要求、期刊简介等,请见下方Call for Papers。


欢迎国内外相关领域专家、学者踊跃投稿!



 

FITEE Special Issue on Cyberspace Security 

Call for Papers

Submission Deadline: August 31, 2018


Cyberspace security has tremendous impacts on various critical infrastructures. The traditional security relies on a static control of security devices deployed on special edges or nodes, such as firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS), for network security monitoring according to pre-specified rules. However, this passive defense methodology is no longer applicable to the protection against new cyberspace security threats, such as advanced persistent threats and 0-day attacks. Moreover, as the cyber threats become ubiquitous and persistent, the diverse attack entry points, high-level intrusion mode, and systematic attack tools make cyber threat deployment less costly. To maximize the security level of core system assets, it is urgent to develop innovative security defense methodologies that can cope with diversified and persistent threats. First, it is necessary to study security approaches to realize active defenses against various complex threats. Second, the networks of critical infrastructures (such as industrial control, smart grid, and transportation systems) have significant vulnerabilities, which are not seen in the traditional Internet security context. Third, communication networks are the backbone of cyberspace, and there are many emerging communication infrastructures, such as software-defined networks and information-centric networks, which can be the subject to threats.

 

This special issue is aimed to provide timely and comprehensive discussions of the current development in cyberspace security, addressing both theoretical and technological advances. Authors are encouraged to submit different types of articles, e.g., perspective articles, communications articles, review articles, and research articles, on topics including but not limited to the following:

 

Mimic security

  • Analysis for attack chain mechanisms of network attacks

  • Mimic defense mechanisms

  • Modelling of highly robust control

  • Strategy algorithms for mimic security

  • Software automation diversification

  • Efficiency evaluation for mimic defense

  • Test-bed for mimic defense

  • Standardization for mimic security

 

Network security for critical infrastructure

  • Analysis for advanced persistent threats (APTs) in critical infrastructure systems (CISs)

  • Security protocols for CISs

  • Security isolation technologies for CISs

  • Security situational awareness for CISs

  • Security evaluation technologies for CISs

  • Embedded security for CISs

  • Big data security for CISs

  • Service security of CISs

 

Novel communication network security

  • Physical layer security for 5G

  • Security protocol for 5G

  • Security based edge computing

  • Security for software-defined networks (SDN)

  • Security for information-centric networks (ICN)

  • Security for Internet of vehicle (IoV)

  • Security for fog computing

  • Security for mobile big data

 

Hardware security

  • Vulnerability analysis for CPU

  • Hardware Trojan discovery

  • Side-channel attacks and defense

  • Advances of cryptographic chip

  • Security for electromagnetic leakage

  • Security for circuit design

  • Advances of physical layer security

 

We also highly recommend the submission of multimedia with each article as it may significantly increase the visibility, downloads, and citations.


All submitted manuscripts must be written in English and must not be under consideration 

elsewhere for publication.The authors must follow the FITEE guidelines (http://www.jzus.zju.edu.cn/manuscript.php) for preparation of their manuscripts. Either Word or LaTex format is acceptable. When Word is used, please keep the layout of the text as simple as possible, e.g., single column, 1.5 lines spacing, 10.5 pt font size, Times New Roman font. When LaTex is used, a template is available at http://www.jzus.zju.edu.cn/download/FITEE_LaTex_template.zip


Templates for accepted papers:

Word: http://www.jzus.zju.edu.cn/download/FITEE_sample.doc

LaTex: http://www.jzus.zju.edu.cn/download/FITEE_LaTex_template.zip

(At the initial submission stage, authors do not need to use these templates. Only when asked to revisemanuscripts after peer reviews, these templates should be used.)


FITEE is an international peer-reviewed journal launched by the Chinese Academy of Engineering (CAE) and Zhejiang University, and co-published by Springer & Zhejiang University Press. FITEE aims to publish the latest implementation of applications, principles, and algorithms in the broad area of Electrical and Electronic Engineering.


All articles published in this special issue will be indexed by SCI-E and will be available from Springerlink (http://www.springer.com/computer/journal/11714), www.jzus.zju.edu.cn, as well as http://engineering.cae.cn/fitee. Please note that all articles must undergo international peer review and Crosscheck processes before acceptance, to ensure that the special issue is of high quality, original, and thought-provoking.


We look forward to your contribution to this special issue. Please send your manuscript via http://www.editorialmanager.com/zusc/. Remember to choose article type “S.I.-CyberSecur”.

Manuscript submission by 

Aug. 31, 2018

Acceptance notification by 

Nov. 15, 2018

Publication date: 

Dec. 31, 2018

 

Editorial Board: 

Editor-in-Chief:

Jiangxing Wu, Professor and Director, National Digital Switching System Engineering & Technological R & D Center, China

Academician, Chinese Academy of Engineering

 

Executive Lead Editors:

Jianhua Li, Professor, Shanghai Jiao Tong University, China

Xinsheng Ji, Professor, National Digital Switching System Engineering & Technological R & D Center, China

 

Editors:

1. Jie Wu, Laura H. Carnell Professor, IEEE Fellow, Temple University, USA

2. Kui Ren, Professor, IEEE Fellow, Zhejiang University, China

3. Julong Lan, Professor, National Digital Switching System Engineering &Technological R & D Center, China

4. Mohammad S. Obaidat, Professor, IEEE Fellow, Fordham University, USA

5. Qiang Wei, Professor, National Digital Switching System Engineering &Technological R & D Center, China

6. Shiyan Hu, Professor, Michigan Technological University, USA

 

For inquiries regarding this special issue, please contact:


Dr. Jun Wu:

Shanghai Jiao Tong University, China

E-mail: junwuhn@sjtu.edu.cn


Editorial Office:

Ziyang Zhai (Managing Editor)

jzus_zzy@zju.edu.cn

86-571-88273162




FITEE最新推出官方微信,功能包括:传播FITEE出版的学术文章;为FITEE关联学人(读者、作者、评审人、编委,等)提供便捷服务;发布学术写作、评审、编辑、出版等相关资讯;介绍信息与电子工程领域学术人物、学术思想、学术成果,展示该领域科学研究前沿进展;为该领域海内外学者提供友好互动平台。


微信号:fitee_cae

加关注

长按识别二维码关注,或微信搜索公众号fitee_cae关注我们。



https://m.sciencenet.cn/blog-630081-1110654.html

上一篇:中国工程院院刊FITEE“人工智能2.0:理论与应用”特刊导读
下一篇:[转载]“学术交流的未来”研讨会通知

1 杨正瓴

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...
扫一扫,分享此博文

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-3-28 23:56

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部