BDEIEC(2021-22): Big Data & Edge Intelligence for Enhanced Cyber Defense |
Website | https://sites.google.com/view/crcbdeiecd/home |
Submission link | https://easychair.org/conferences/?conf=bdeiforenhancedcyber |
Submission deadline | August 30, 2021 |
Edge AI in Future Computing
Series Editor: Dr. Arun Kumar Sangaiah & Dr. Mamta Mittal
Big Data & Edge Intelligence for Enhanced Cyber Defense: Principles and Research
by CRC Press, Taylor & Francis Group
Scope
The book titled “Big Data & Edge Intelligence for Enhanced Cyber Defense: Principles and Research” inculcate recent trends and techniques of Edge Artificial Intelligence (EdgeAI) principles for designing cyber defense systems such as including but not limited to host-based and network-based intrusion detection system, embedded security systems, digital forensic intelligence, forensic data analytics, Artificial Intelligence (AI) based smart appliances and smart grid forensic, the ongoing integration of AI methodologies in law enforcement and deep learning models to combat cybercrime. In a nutshell, the book introduces the EdgeAI based latest trends and techniques, methods, approaches, which is intended to help cyber security experts to design robust Cyber Defense Systems (CDS).
Overview
The widespread acceptance and growing penetration of the Internet and mobile technologies have revolutionized our existence. On the flip side of this technological advancement, the world is witnessing and suffering due to technologically aided crime methods. These threats, including but not limited to hacking and intrusions is giving nightmare to security experts. The almost perpetual changes occupying in the field of Information and Communication Technologies (ICT) results in the development of newer and better techniques being exploited by hackers. While a foolproof method to efficiently counter all threats is still far from being realized current research is investing in behavior pattern identification.
This book extensively highlights recent state-of-the-art edge artificial intelligence approaches used for enhanced cyber defense mechanisms to handle big data. It provides a glimpse of computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cybersecurity big data. Apart from edge artificial intelligence techniques, this book also demonstrates in detail the reviews of recent cyber threats and attacks and their countermeasures.
Editors
Dr. Ranjit Panigrahi
Assistant ProfessorDepartment of Computer Applications, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Majitar, Sikkim, India - 737136
Prof. Victor Hugo C. de Albuquerque
Federal University of Ceará, Fortaleza, Fortaleza/CE, Brazil; Federal Institute of Education, Science and Technology of Ceará, Fortaleza/CE, Brazil
Dr. Akash Kumar Bhoi
Assistant ProfessorDepartment of Electrical & Electronics Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Majitar, Sikkim, India - 737136
Dr. Hareesha K.S.
Professor, Department of Computer Applications at Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal,India - 576104
Call for Chapters
This book calls chapters based on recent state-of-the-art edge artificial intelligence approaches used for enhanced cyber defense mechanisms to handle big data. Chapters should provide a glimpse of computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cybersecurity big data. Apart from edge artificial intelligence techniques, this book also calls chapters related to reviews of recent cyber threats and attacks and their countermeasures. Chapters solicited for this book are -
Chapter 1. A Brief introduction to cyber threats and related countermeasures
This chapter will be dealt with a brief introduction of Cyber Defense Systems that has been outlined highlighting the modern threats and attacks in various network environments such as host-based network-based, smart grid. An emphasis will be given to categorize and presents a detailed taxonomy of cyber threats according to the source of origination and location. A brief introduction of the latest available defense mechanisms is also discussed in this chapter. As an introductory chapter, these topics enlighten the readers with a brief idea of current threats found in the cyber arena.
Chapter 2. Edge Artificial Intelligence – An Overview
This chapter will be a brief introduction to Edge Artificial Intelligence. The chapter aims to deliver advantages of EdgeAI; viz., real-time operations, reduced power consumption, decreased data communication cost, and increased privacy. It is also intended to deliver the role of EdgeAI to handle cybercrimes and related threats. The role of EdgeAI will also be analyzed looking forward, how effectively it allows the network topology to be fault-tolerant even in the influence of attacks.
Chapter 3. Reviews of EdgeAI based Cyber Defense Mechanisms
This chapter will provide a brief survey of state-of-art EdgeAI based Cyber Defense Mechanisms (CDMs). Various CDMs are explored based on detection type and approaches. Emphasis will be given to those methods that integrate signature-based CDMs in the process of detection. Moreover, many modern embedded EdgeAI based methods will be explored that acts as the front line of defense in the network environment. Further, a detailed taxonomy of CDMs datasets that are huge and contains recent attack trends will be explored elaborating the target environment.
Chapter 4 to Chapter 15. Contributory Chapters from prospective authors
All 11 chapters will be dealt with specific challenging areas pertaining to cyber defense through Edge AI. The chapters are called from the prospective authors through an invitation in the following 11 areas, including but not limited to –
- Artificial Intelligence and Machine Learning for intrusion identification and prevention in vulnerable environments
- Improvising Digital forensic intelligence through EdgeAI techniques
- Digital Investigation and forensic data analytics
- Proactive and Adaptive Defense of Network Infrastructure
- Artificial Intelligence (AI) based smart appliances and smart grid forensic
- Trustworthy infrastructures, services, and applications for sensing technologies.
- Attacks detection and prediction based on deep and reinforcement learning.
- Cryptocurrency-enabled crimes and countermeasures
- Cybersecurity Metrics and Assessment
- Bio-inspired cyber defense mechanisms
- AI-based security protocols to enhance cyber defense
Important Dates
All chapters submission and correspondence thereupon should adhere to the following timeline for on-time publication. The publication date will be decided by the editor-in-chief.
Chapters Submission: August 30, 2021 (On or before)
Review Notification: September 30, 2021 (On or before)
Camera Ready Submission: October 30, 2021 (On or before)
Author's Guideline
Microsoft Word is the only acceptable format for the text. Manuscripts written in other word processors that are converted to the word may have corruption issues so this method is not recommended. WordPerfect software is not acceptable software for text.
Authors will double-space the manuscript and unembed the figures from the text and save each figure separately in a separate folder. CRC Press will format the pages.
Each chapter should have a 150-200 word chapter abstract included for its metadata to improve searchability in various websites and platforms. Guidelines will be provided. Please confirm that you will include an abstract for each chapter in your manuscript before your submission.
Each chapter should contain a minimum of 35-40 double-spaced pages with Font: Times New Roman, Size: 12pt. The contributory chapters should provide a direction towards the book title and scope. The chapter files should only include the final chapter text and If tracked changes were used during the writing process, please ensure they are resolved, and that tracking is stopped on the version you submit.
Illustrative material (except tables) should be supplied as separate files in the original format.
As with track changes. Should you need to communicate specific requirements to us, please do so separately using the dedicated tools (such as the notes for the copyeditor form) or by email.
Keep the layout simple. Your book will be professionally typeset, so you do not need to attempt to format the manuscript to convey a text design or how the final book will look. For example:
- Use a Unicode font available from Microsoft Word, such as Arial or Times New Roman.
- Number the pages of each chapter from 1 within each file.
- Add a line between paragraphs and avoid indents at the start of a paragraphs
- Do not use hyphenation to break words across a line (only in words where a hyphen is grammatically required).
- Do not present text in columns (even if columns will be used in the final book).
Please keep in mind that all references, notes, and bibliographies or reference lists are included in the agreed page count.
Tables must be supplied in an editable format. Images of tables from other sources must be rekeyed. Please use the table functionality in Microsoft Word and avoid using tabs and line breaks to construct the appearance of a table (which is prone to shift and become unintelligible during copyediting and typesetting). Larger tables can be created in Microsoft Excel. Editable tables may be included in the chapter text file or as separate files named accordingly.
Further details regarding the authors guidelines are available here
For the preparation of the manuscript download the MS Word template from here
For indexing information click here
Do not hesitate to contact us at ranjit.panigrahi@gmail.com if you have any questions. Please mention "Big Data & Edge Intelligence for Enhanced Cyber Defense" in the subject line in your email.