[Corpora-List] Call for Book Chapters

Basant Agarwal basantagarwal476 at gmail.com
Mon Sep 10 11:45:38 CEST 2018

*//** Apologies, if you have received multiple copies. Please send the email to interested Colleagues and Research Scholars **//* Call for Chapters: Forensic Investigations and Risk Management in Mobile and Wireless Communications <https://www.igi-global.com/publish/call-for-papers/call-details/3440> Introduction Mobile Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Mobile Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skilful practitioners can extract actionable information from practically any device that a government, private agency, or even a skilful individual might encounter. The field of Mobile forensic analysis is as rapidly changing as other security fields.

Objective Mobile security when combined with mobile forensic gives rise to a term known as mobile investigation and analysis, which is nothing but a type of digital forensics which aims at the analysis of mobile device and data of a system for collection of information pertaining to the legal evidences related to various security breaches and intrusion detection. The mobile network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.

The two major tasks that are performed by it include: • Keeping a check over anomalous traffic • Intrusion detection

The intruder tries to steal the significant information from the communication that takes place in the mobile network. Mobile forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcement that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing mobile forensics like Wireshark. Another category of mobile forensic is mobile data analysis which deals with the Android and iOS and its applications. The use of malware analysis plays a crucial role in this.

Target Audience The target audience of this book will be composed of professionals and researchers working in the field of mobile forensic and analytics, network security, computer science, security engineering, cybercrime and forensic computing. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.

Recommended Topics Mobile Security: Attacks and Controls Analysis of attacks, defences, and countermeasures Anonymity, Privacy, ID theft and Ethics Dependability and security forensics Denial-of-Service and botnet analysis, detection, and mitigation NetworkMinerCLI: Automating content extraction with our command line tool Cyber Crime Toolkit Development Securing Mobile Sensor Networks Mobile Service Security Problem in Cyber Ethics Mobile Ad Hoc Network Security Vulnerabilities Cyber Crimes and Profiling System Impact of Mobile Data on Security Forensic Impacts on Social Media Platforms Mobile Apps Mobile Forensic: Today & Tomorrow Smartphone Security & Forensic Analysis

Submission Procedure Researchers and practitioners are invited to submit on or before *October 31, 2018*, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by *November 20, 2018*, about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by *January 20, 2018,* and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/p ublish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager.

Publisher This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2019.

Important Dates *October 31, 2018*: Proposal Submission Deadline *November 20, 2018*: Notification of Acceptance *January 20, 2018*: Full Chapter Submission *February 20, 2018*: Review Results Returned *March 15, 2018*: Final Acceptance Notification *April 30, 2018*: Final Chapter Submission

Inquiries Kavita Sharma kavitasharma_06 at yahoo.co.in

Mitsunori Makino makino.fme7 at g.chuo-u.ac.jp

Gulshan Shrivastava gulshanstv at gmail.com

Basant Agarwal basant at skit.ac.in

Propose a chapter for this book <https://www.igi-global.com/publish/call-for-papers/submit/3440>

~Kind Regards Basant Agarwal -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 34567 bytes Desc: not available URL: <https://mailman.uib.no/public/corpora/attachments/20180910/7b69943a/attachment.txt>

More information about the Corpora mailing list