ISI Journal Publication

ISI Journal Publication
The high-quality accepted papers will be given a priority to publish their extended version in any of three special issues in these ISI-indexed international journals:

1) International Journal of Distributed Sensor Networks

Special issue on: “Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014”

Lead Guest Editor
Muhammad Khurram Khan, Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia

Guest Editors
Yang Xiang, School of Information Technology, Deakin University, VIC, Australia
Shi-Jinn Horng, National Taiwan University of Science and Technology, Taipei City, Taiwan
Hsiao-Hwa Chen, National Cheng Kung University, Tainan, Taiwan

Call for Papers

Recent advances in wireless communication technologies and applications have enabled the large-scale deployment of wireless sensor networks (WSNs). These networks have applications in several important and critical areas, such as military, critical infrastructure monitoring, healthcare, environment monitoring, and manufacturing. Security and privacy are critical issues to many sensor network applications, and it is a paramount concern for the growth of WSNs. Providing security and privacy to WSNs is challenging due to the open nature of wireless communication and the limited capabilities of sensor nodes in terms of processing power, storage, bandwidth, and energy. Moreover, widespread and unrestricted deployment of WSNs makes them exposed to a number of security and privacy vulnerabilities.

This special issue is aimed at fostering the latest development in the design, implementation, and evaluation in the fields of trust, security, and privacy of WSNs. Original contributions that provide novel theories, frameworks, and solutions to challenging problems of trust, security, and privacy will be solicited for this special issue. Potential topics include, but are not limited to:

Security, privacy, and cryptographic algorithms in WSNs
Security and privacy in body sensor networks
Software security for sensor network nodes
Security and privacy in medical/body sensor networks
Trustworthy key management and key distribution systems
Authentication protocols in WSNs
Security and privacy policies and legislation of WSNs
Building trustworthy WSN applications

2) The Scientific World Journal

Special issue on: “Recent Advances in Information Security”

Lead Guest Editor
Fei Yu, Peoples’ Friendship University of Russia, Moscow, Russia

Guest Editors
Chin-Chen Chang, Feng Chia University, Taichung, Taiwan
Muhammad Khurram Khan, King Saud University, Riyadh, Saudi Arabia
Tianjie Cao, China University of Mining and Technology, Xuzhou, China
Mirjana Ivanovic, University of Novi Sad, Novi Sad, Serbia

Call for Papers

Recent years have witnessed rapid developments of the information communication technology and the next-generation Internet. We have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which make it possible to realize the ubiquitous network and society. But, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, and free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Researchers, content industry engineers, and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.

This special issue aims to bring together related research works in the realm of ubiquitous network and multimedia contents security and further investigates and discusses trusted solutions and secure techniques for ubiquitous network as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their intellectual property rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness, and multimedia contents sharing in ubiquitous network society, will be embraced by the special issue. Potential topics include, but are not limited to:

  • Access control
  • Cloud computing security
  • Computer forensics
  • Cryptography and applications
  • Data and system integrity
  • Database security
  • Electronic commerce security
  • Information discovery
  • Information hiding
  • Intrusion detection
  • Network security
  • Operating system security
  • Public key cryptosystems
  • Public key infrastructure
  • Security issues in the Internet of things
  • Software security


3) International Journal of Biometrics
Special issue on: "Emerging Biometric Modalities"
Guest Editors
Dr. Michal Choras, University of Technology and Life Sciences, Poland

Call for Papers
Biometric human identification has now become a reality and there are many large-scale deployments or applications (e.g. travel documents, law enforcement, access to laptops, etc.) of traditional biometric methods, mainly fingerprints, face recognition, hand geometry, hand veins or irises.
Still, there is ongoing effort in the pursuit of other modalities and methods for identifying humans. Some of them have appeared very recently, but others are no longer in their infancy and allow for promising results (e.g. ear or knuckle/FKP). Therefore, the goal of this special issue is to collect high-quality papers regarding emerging biometric modalities.
We invite prospective authors to submit papers reporting new modalities, approaches, feature extraction algorithms, applications and results regarding such physiological and behavioural modalities as (but not limited to):

    • Ear biometrics (2D, 3D)
    • Lip recognition
    • Lip prints
    • Knuckle (finger-knuckle print) biometrics
    • Nails/nail veins
    • Soft biometrics
    • Odour
    • Palmprints
    • Footprints
    • EEG


    4) The Scientific World Journal, Hindawi

    Special Issue on: "Network Surveillance and Intruder Detection"

    Visual surveillance networks are installed in many security sensitive places in today’s world. In most of the cases, human security officers are required to continuously stare at large numbers of monitors simultaneously and for long periods of time. Constant alert vigilance for hours on end is difficult to maintain for human beings with natural cognitive limits on concentration and attention spans. It is thus important to remove the onus of detecting untoward activity, events which rarely occur, from the human security officer to an automated system. While various automated surveillance techniques are being developed based on installed static camera network, some other technologies like wireless visual or multimedia sensor networks could contribute in the process to make the systems more efficient by employing event-based activation strategies. All these camera-equipped networked devices of different categories could be assigned distinctive identification tags and thus, they could form an Internet of Things (IoT) to allow efficient network surveillance with minimal involvement of human operators. Many Internet-connected devices in this way would allow us to sense, warn, and control the physical world around us. Numerous research issues on the relevant fields are emerging as a need of time. This special issue opens the door for the researchers to publish their thoughts, models, findings, analysis, and future expectations in the broad field of automated network surveillance and intruder detection. Any topic related to automated network surveillance and intruder detection would be considered. Both original research and review articles on the topics are welcome. Potential topics include, but are not limited to:

    - Automated surveillance algorithms
    - Cost effective network surveillance using sensors
    - Surveillance network models
    - Adoption of IP-based cameras in surveillance networks
    - Metadata analysis in IoT based surveillance networks
    - Visual sensor based IoT
    - Security and reliability of IoT-based surveillance networks


Copyright © isbast2014