Focus on Virus
Deadline extended: Dec. 31, 2013 - CFP: IEEE Computer SI on methodologies and solutions for mobile application security Dec 12 2013 03:44PM
Wright, Matthew (mwright uta edu)
Due to many requests, we extended the submission deadline to Dec. 31st, 2013.

Call for Articles for IEEE Computer
Computer seeks submissions for a June 2014 special issue on
methodologies and solutions for mobile application security.

With the ubiquitous use of mobile devices, mobile application security has
become an important research topic. Compared with personal computers or
servers, mobile devices store much more sensitive personal information and
are thus attractive targets for attackers seeking financial gain. Because
these devices are always online and have a restricted user interface, it is
easier for attackers to hide their malicious activities.

This special issue aims to present high-quality articles describing security
algorithms, protocols, policies, and frameworks for applications running on
modern mobile platforms such as Android, iOS, and Windows Mobile. Only
submissions describing previously unpublished, original, state-of-the-art
research that are not currently under review by a conference or journal will
be considered.

Appropriate topics include, but are not limited to, the following:
* app and app store security and privacy;
* benchmarking and evaluation of mobile security solutions;
* bots on mobile devices;
* cloud security and privacy, as related to mobile devices;
* mobile device forensics;
* security and privacy in mobile device operating systems and middleware;
* mobile malware collection, statistics, and analysis;
* mobile services and social networking security;
* reverse engineering and automated analysis of mobile malware;
* security for smart payment applications, including near-field communication;
* standardization efforts related to developing and vetting mobile apps;
* testbeds and case studies for mobile platforms;
* traffic monitoring and detection algorithms for mobile platforms;
* usability of approaches for mobile security and privacy;
* virtualization solutions for mobile security; and
* Web browser security on mobile devices.

Articles should be original and understandable to a broad audience of
computing science and engineering professionals, avoiding a focus on theory,
mathematics, jargon, and abstract concepts. All manuscripts are subject to
peer review on both technical merit and relevance to Computer?s readership.
Accepted papers will be professionally edited for content and style.

The guest editors for this special issue include
Ying-Dar Lin, National Chiao Tung University, Hsinchu, Taiwan
(lead: ydlin (at) cs.nctu.edu (dot) tw [email concealed]);
Chun-Ying Huang, National Taiwan Ocean University, Keelung, Taiwan
(chuang (at) ntou.edu (dot) tw [email concealed]);
Matthew Wright, University of Texas at Arlington
(mwright (at) cse.uta (dot) edu [email concealed]); and
Georgios Kambourakis, University of the Aegean, Samos, Greece
(gkamb (at) aegean (dot) gr [email concealed]).

Submissions are due by 31 December 2013. For author guidelines and
information on how to submit a manuscript, visit
http://www.computer.org/portal/web/peerreviewmagazines/computer

Schedule
Manuscript Submission: December 31, 2013 (extended)
Notification of Acceptance: February 1, 2014
Final Manuscript Due: March 1, 2014
Publication: June 2014

------------------------------------------------------------------------
---
This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier
technical event for ICT security experts. Featuring 30 hands-on training
courses and 90 Briefings presentations with lots of new content and new
tools. Network with 4,000 delegates from 70 nations. Visit product
displays by 30 top sponsors in a relaxed setting.

http://www.blackhat.com
------------------------------------------------------------------------
---

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus