Powered by Blogger.

Tuesday 25 June 2013

Computer magazine dingbat logoSpecial Issue on Methodologies and Solutions for Mobile Application Security

 With the ubiquitous use of mobile devices, mobile application security has become an important research topic. Compared with personal computers or servers, mobile devices store much more sensitive personal information and are thus attractive targets for attackers seeking financial gain. Because these devices are always online and have a restricted user interface, it is easier for attackers to hide their malicious activities.
This special issue aims to present high-quality articles describing security algorithms, protocols, policies, and frameworks for applications running on modern mobile platforms such as Android, iOS, and Windows Mobile. Only submissions describing previously unpublished, original, state-of-the-art research that are not currently under review by a conference or journal will be considered.
Appropriate topics include, but are not limited to, the following:
  • app and app store security and privacy;
  • benchmarking and evaluation of mobile security solutions;
  • bots on mobile devices;
  • cloud security and privacy, as related to mobile devices;
  • mobile device forensics;
  • security and privacy in mobile device operating systems and middleware;
  • mobile malware collection, statistics, and analysis;
  • mobile services and social networking security;
  • reverse engineering and automated analysis of mobile malware;
  • security for smart payment applications, including near-field communication;
  • standardization efforts related to developing and vetting mobile apps;
  • testbeds and case studies for mobile platforms;
  • traffic monitoring and detection algorithms for mobile platforms;
  • virtualization solutions for mobile security; and
  • Web browser security on mobile devices.

Articles should be original and understandable to a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.
The guest editors for this special issue include Ying-Dar Lin, National Chiao Tung University, Hsinchu, Taiwan (lead: ydlin@cs.nctu.edu.tw); Chun-Ying Huang, National Taiwan Ocean University, Keelung, Taiwan; Matthew Wright, University of Texas at Arlington; and Georgios Kambourakis, University of the Aegean, Samos, Greece.

Read more...

Computer magazine dingbat logoSpecial Issue on Smart Camera Networks

 Due to simultaneous advances in four key disciplines—computer vision, image sensors, embedded computing, and sensor networks—smart camera networks have emerged over the past decade. These real-time, distributed, embedded systems use multiple cameras to capture data in private as well as public environments, with applications in security, monitoring, and smart environments.
The guest editors solicit papers covering all areas of smart camera networks including hardware-, software- and system-level aspects. The specifically invite contributions providing an interdisciplinary view of this topic or reporting on real deployments and novel applications. Suggested topics include, but are not limited to, the following:
  • novel camera and camera network design and architectures,
  • network-level video processing and analysis,
  • network-level coordination and control,
  • distributed processing in camera networks,
  • human interaction with camera networks,
  • camera networks on mobile platforms, and
  • emerging applications.

Articles should be original and understandable to a broad audience of computer science and engineering professionals, avoiding a focus on theory, mathematics, jargon, and abstract concepts. All manuscripts are subject to peer review on both technical merit and relevance to Computer's readership. Accepted papers will be professionally edited for content and style.

Read more...

Computer magazine dingbat logoSpecial Issue on Collaborative Information Seeking

 For many years, information retrieval has focused on individual users searching for information. Algorithms have assumed that one person is reviewing the results, and user interfaces have supported the needs of individual searchers.
CIS–also referred to as collaborative information retrieval and collaborative search–focuses on the notion that information seeking is not always a solitary activity, and that people working in collaboration to perform information-seeking tasks should be studied and supported. CIS occurs in many contexts, including healthcare, business intelligence, technical fields, strategic research, information analysis, planning tasks, and everyday activities such as shopping and travel.
Submissions should be original manuscripts that describe research, experiences, and software tools/algorithms/architectures focused on support for collaborative information seeking. Specific topics include
  • CIS theories and models;
  • design guidelines and experiences;
  • CIS applications in different domains, such as e-learning environments, healthcare, subiness, office work, and intelligence analysis;
  • approaches for incorporating CIS with social search;
  • issues related to collaborators' awareness of actions, time/space, and participants' roles;
  • algorithmic and user mediation of the search process;
  • methodologies for studying CIS;, and
  • software tools and algorithms to support collaborative search.
All submissions are subject to peer review based on both technical merit and relevance to Computer's readership, which includes a large base of developers interested in information they can apply practically in their work. Accepted papers will be professionally edited for content and style.

Direct inquiries to the guest editors: Chirag Shah, Rutgers University; Rob Capra, University of North Carolina, Chapel Hill; and Preben Hansen, Stockholm University.

Read more...

  © Blogger templates The Professional Template by Ourblogtemplates.com 2008

Back to TOP