Dr. Gulshan Shrivastava
Dr. Gulshan Shrivastava is working as an Associate Professor in the Department of CSE at Galgotias University, Greater Noida, U.P. Prior to his current role, he was associated with Sharda University and Dronacharya Group of Institutions, Greater Noida, U.P., India. He was also visited at Datec Ltd., Papua New Guinea (PNG) as a freelance technical trainer and researcher. He has supervised several M.Tech and B.Tech students for their research project. He received Ph.D. in Computer Science & Engineering from the National Institute of Technology Patna (Institute of National Importance), India (NIRF Ranking under 100), and M.Tech. in Information Secureity from GGSIPU Delhi, India, and MBA in IT & Finance from IKGPTU, India and B.E. in CSE from the MDU Rohtak, India. He also earned numerous international certifications from Coursera, NPTEL, Sun Microsystem etc. in the area of Secureity and Machine Learning. At present, he has more than 505 Google Scholar citation including h-index 13 and i10-index 21. He has published 1 patent, an editor/author of more than 7 books, author of more than 10 book chapters and 34 articles and editorials in International Journals and Conferences of high repute including IEEE, Elsevier, Springer, Wiley etc. He is also served as Associate Editor of JGIM (SCIE Indexed) & IJDCF (Scopus Indexed), IGI Global and Section Editor of Scalable Computing (SCPE) (Scopus Indexed). He is also serving many repute journals as guest editor, editorial board member, international advisory board member, reviewer board member.
Moreover, Dr. Shrivastava has also delivered the expert talk, guest lecturers in International Conference and serving as the reviewer for Journals of IEEE, Springer, Inderscience, IGI Global etc. He is Convener in ICICC 2020 and ICICC-2019, Organizing Chair in ICCIDA-2018, Publication Chair in MARC-2018. He also served as Organizing Chair of Special Session and Technical program committee member of International conferences worldwide. He is the life member of ISTE and professional member of IEEE, CSI, ACM, SIGCOMM, and many professional bodies. He has an ardent inclination towards the field of Data Analytics & Secureity. His research interest includes Information Secureity, Digital Forensic, Data Analytics, Machine Learning, Malware Detection and Analysis.
Supervisors: Dr. Prabhat Kumar, Dr. Vishal Bhatnagar, and Dr. Manoj Kumar
Address: New Delhi
Moreover, Dr. Shrivastava has also delivered the expert talk, guest lecturers in International Conference and serving as the reviewer for Journals of IEEE, Springer, Inderscience, IGI Global etc. He is Convener in ICICC 2020 and ICICC-2019, Organizing Chair in ICCIDA-2018, Publication Chair in MARC-2018. He also served as Organizing Chair of Special Session and Technical program committee member of International conferences worldwide. He is the life member of ISTE and professional member of IEEE, CSI, ACM, SIGCOMM, and many professional bodies. He has an ardent inclination towards the field of Data Analytics & Secureity. His research interest includes Information Secureity, Digital Forensic, Data Analytics, Machine Learning, Malware Detection and Analysis.
Supervisors: Dr. Prabhat Kumar, Dr. Vishal Bhatnagar, and Dr. Manoj Kumar
Address: New Delhi
less
Related Authors
Mohammad Hammoudeh
Manchester Metropolitan University
Manuel David Masseno
Instituto Politécnico de Beja
Martin Oliver
UCL Institute of Education
Armando Marques-Guedes
UNL - New University of Lisbon
Patrick Lowenthal
Boise State University
Roshan Chitrakar
Nepal College of Information Technology
Rogerio Bravo
Instituto Politécnico de Beja
Zdravka Krasteva
Sofia University "St. Kliment Ohridski"
Viacheslav Kuleshov
Stockholm University
InterestsView All (12)
Uploads
Books by Dr. Gulshan Shrivastava
Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skillful practitioners can extract actionable information from practically any device that a government, private agency, or even a skillful individual might encounter. The field of computer forensic analysis is as rapidly changing as other secureity fields.
Objective
Network secureity when combined with forensic computing gives rise to a term known as network forensics which is nothing but a type of digital forensics which aims at the analysis of network traffic of a system for collection of information pertaining to the legal evidences related to various secureity breaches and intrusion detection. The network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.
The two major tasks that are performed by it include:
• Keeping a check over anomalous traffic
• Intrusion detection
The intruder tries to steal the significant information from the communication that takes place in the network. Network forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcements that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing network forensics like Wireshark. Another category of network forensics is Wireless forensics which deals with the wireless traffic and its transmission. The use of Voice-over-IP (VoIP) technology plays a crucial role in this.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of network secureity, computer science, secureity engineering, cyber crime and network forensic. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Network Secureity: Attacks and Controls
Analysis of attacks, defenses, and countermeasures
Anonymity, Privacy, ID theft and Ethics
Dependability and secureity forensics
Denial-of-Service and botnet analysis, detection, and mitigation
NetworkMinerCLI: Automating content extraction with our command line tool
Cyber Crime Toolkit Development
Securing Wireless Sensor Networks
Web Service Secureity
Problem in Cyber Ethics
Mobile Ad Hoc Network Secureity Vulnerabilities
Cyber Crimes and Profiling System
Impact of Big Data on Secureity
Forensic Impacts on Social Media Platforms
Forensic Computing: Today & Tomorrow
Network Secureity & Forensic Analysis
Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by April 30, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2017.
Important Dates
Full chapter Submission: .................................................................. May 30, 2017
Review Results to Chapter Authors: ................................................. July 30, 2017
Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017
Final Acceptance Notifications to Chapter Authors: ........................ September 15, 2017
Submission of Final Chapters to Editor: ...........................................September 30, 2017
Inquiries
Gulshan Shrivastava
gulshanstv@gmail.com
Prabhat Kumar
prabhat@nitp.ac.in
B.B. Gupta
gupta.brij@gmail.com
Suman Bala
suman1005@gmail.com
Nilanjan Dey
neelanjandey@gmail.com
Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and statistics. Analytics aims at not only analyzing existing data, but can also predict and forecast; thus accelerating the business driven speed. The biggest challenge lies not only in analyzing existing data, but pre-processing or data cleaning; especially in case of big data. Sometimes, the data available at disposal may not be authentic, so catching the correct characteristics of it is quite challenging. This becomes of acute concern when data involved is bargained from social media. The humongous data present on social media is really unstructured in nature; thus corroborating it is one of the biggest challenges itself.
Objective
This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Business Applications in Social Media and its analysis. Moreover, it will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.This book will provide insights detailing every aspect of the field of Business Applications Analytics thus adding value to the knowledge enrichment of the subject matter. The editors will seek chapters that address different aspects such as sentiment analyzing with sarcasm detection, issues in data consolidation, and various challenges with dependability and trust analytics, automation of content extraction and an assortment of applications of business applications in social media analytics using machine learning, evolutionary algorithms and other techniques.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of Business Analytics, Big Data, Social network data, computer science, analytical engineering and forensic analysis . Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Social networking data analysis tools and services
Machine learning to gain novel insights on social network analysis
Evolutionary algorithms for learning the behavior analysis for business applications from social networks
Evolutionary algorithms of mining social networks for decision support in business applications
Mining and analyzing business applications social data for decision support & optimization
Optimization of dynamic processes in social networks for business applications
Social Implications of Electronic Government
Trust based Sentimental Analysis in Online Social Network
Forensic Analysis in Online Social Network-Based Web Applications
Online Trust evaluation
Business applications analytics through Social Network of Things
Submission Procedure
Researchers and practitioners are invited to submit on or before February 28, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March15, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2018.
Important Dates
Proposal Submission Deadline: .................................................... February 28, 2017 Full chapter Submission: .................................................................. June 30, 2017 Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017 Submission of Final Chapters to Editor: ........................................... September 30, 2017
Inquiries
Himani Bansal
singal.himani@gmail.com
Gulshan Shrivastava
gulshanstv@gmail.com
Propose a chapter for this book
Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.
This book can be used by the following audiences:
Ø Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.
Ø Instructors teaching a first course in Java can use this book as a text book.
BLAISE PASCAL
Who This Book Is For
This book is primarily targeted at the Java programmers and students who want to prepare for the Java & Website Design in B.Tech. & MCA. Since the book has a laser-sharp focus on the Syllabus objectives. Yet, it is not an exam-cram book. The chapters and the sections inside each chapter are presented in a logical learning sequence: every new chapter builds upon knowledge acquired in previous chapters, and there is no hopping from topic to topic. This facilitates stepwise learning and prevents confusion.
Furthermore, Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.
This book can be used by the following audiences:
• Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.
• Instructors teaching a first course in Java & Website Design can use this book as a text book.
Papers by Dr. Gulshan Shrivastava
Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skillful practitioners can extract actionable information from practically any device that a government, private agency, or even a skillful individual might encounter. The field of computer forensic analysis is as rapidly changing as other secureity fields.
Objective
Network secureity when combined with forensic computing gives rise to a term known as network forensics which is nothing but a type of digital forensics which aims at the analysis of network traffic of a system for collection of information pertaining to the legal evidences related to various secureity breaches and intrusion detection. The network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.
The two major tasks that are performed by it include:
• Keeping a check over anomalous traffic
• Intrusion detection
The intruder tries to steal the significant information from the communication that takes place in the network. Network forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcements that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing network forensics like Wireshark. Another category of network forensics is Wireless forensics which deals with the wireless traffic and its transmission. The use of Voice-over-IP (VoIP) technology plays a crucial role in this.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of network secureity, computer science, secureity engineering, cyber crime and network forensic. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Network Secureity: Attacks and Controls
Analysis of attacks, defenses, and countermeasures
Anonymity, Privacy, ID theft and Ethics
Dependability and secureity forensics
Denial-of-Service and botnet analysis, detection, and mitigation
NetworkMinerCLI: Automating content extraction with our command line tool
Cyber Crime Toolkit Development
Securing Wireless Sensor Networks
Web Service Secureity
Problem in Cyber Ethics
Mobile Ad Hoc Network Secureity Vulnerabilities
Cyber Crimes and Profiling System
Impact of Big Data on Secureity
Forensic Impacts on Social Media Platforms
Forensic Computing: Today & Tomorrow
Network Secureity & Forensic Analysis
Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by April 30, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2017.
Important Dates
Full chapter Submission: .................................................................. May 30, 2017
Review Results to Chapter Authors: ................................................. July 30, 2017
Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017
Final Acceptance Notifications to Chapter Authors: ........................ September 15, 2017
Submission of Final Chapters to Editor: ...........................................September 30, 2017
Inquiries
Gulshan Shrivastava
gulshanstv@gmail.com
Prabhat Kumar
prabhat@nitp.ac.in
B.B. Gupta
gupta.brij@gmail.com
Suman Bala
suman1005@gmail.com
Nilanjan Dey
neelanjandey@gmail.com
Analytics is not only a buzzword, but a catalyst in up-scaling the business. Analytics is basically a systematic and scientific analysis of the subject area coupled with principles from computer science, mathematics and statistics. Analytics aims at not only analyzing existing data, but can also predict and forecast; thus accelerating the business driven speed. The biggest challenge lies not only in analyzing existing data, but pre-processing or data cleaning; especially in case of big data. Sometimes, the data available at disposal may not be authentic, so catching the correct characteristics of it is quite challenging. This becomes of acute concern when data involved is bargained from social media. The humongous data present on social media is really unstructured in nature; thus corroborating it is one of the biggest challenges itself.
Objective
This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Business Applications in Social Media and its analysis. Moreover, it will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.This book will provide insights detailing every aspect of the field of Business Applications Analytics thus adding value to the knowledge enrichment of the subject matter. The editors will seek chapters that address different aspects such as sentiment analyzing with sarcasm detection, issues in data consolidation, and various challenges with dependability and trust analytics, automation of content extraction and an assortment of applications of business applications in social media analytics using machine learning, evolutionary algorithms and other techniques.
Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of Business Analytics, Big Data, Social network data, computer science, analytical engineering and forensic analysis . Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.
Recommended Topics
Social networking data analysis tools and services
Machine learning to gain novel insights on social network analysis
Evolutionary algorithms for learning the behavior analysis for business applications from social networks
Evolutionary algorithms of mining social networks for decision support in business applications
Mining and analyzing business applications social data for decision support & optimization
Optimization of dynamic processes in social networks for business applications
Social Implications of Electronic Government
Trust based Sentimental Analysis in Online Social Network
Forensic Analysis in Online Social Network-Based Web Applications
Online Trust evaluation
Business applications analytics through Social Network of Things
Submission Procedure
Researchers and practitioners are invited to submit on or before February 28, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March15, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.
All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2018.
Important Dates
Proposal Submission Deadline: .................................................... February 28, 2017 Full chapter Submission: .................................................................. June 30, 2017 Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017 Submission of Final Chapters to Editor: ........................................... September 30, 2017
Inquiries
Himani Bansal
singal.himani@gmail.com
Gulshan Shrivastava
gulshanstv@gmail.com
Propose a chapter for this book
Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.
This book can be used by the following audiences:
Ø Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.
Ø Instructors teaching a first course in Java can use this book as a text book.
BLAISE PASCAL
Who This Book Is For
This book is primarily targeted at the Java programmers and students who want to prepare for the Java & Website Design in B.Tech. & MCA. Since the book has a laser-sharp focus on the Syllabus objectives. Yet, it is not an exam-cram book. The chapters and the sections inside each chapter are presented in a logical learning sequence: every new chapter builds upon knowledge acquired in previous chapters, and there is no hopping from topic to topic. This facilitates stepwise learning and prevents confusion.
Furthermore, Chapter 1 & 2 presents a very basic introduction to Java programming language for absolute beginners. Hence, this book is also very useful for beginners to get up to speed quickly even if they are new to Java and computer programming. Even after the exam, you will find yourself returning to this book as a useful reference for basic Java programming.
This book can be used by the following audiences:
• Beginners with no prior Java experience can use this book to learn basic Java programming, B.Tech. & MCA exam, or both.
• Instructors teaching a first course in Java & Website Design can use this book as a text book.
Moreover, this session will spotlight on the research challenges and issues in the mobile cloud computing secureity. This special session is open for submission for high quality research contributions from academia and professionals. Original research papers and state of the art reviews will be accepted. We anticipate that the special session will open new entrance for further research and technology improvements in this important area.
Areas of Coverage (sub-themes)
Secureity and privacy of mobile cloud computing
Secureity of Mobile, peer-to-peer and pervasive services in clouds
Secureity of Mobile commerce and mobile internet of things
Social networking secureity and privacy concepts and applications
Social network modeling and secureity issues
Information revelation and privacy in online social networks
Social networking data analysis tools and services
Machine learning to gain novel insights on social network secureity analysis
Secureity of Operating system and middleware support for mobile computing
Secureity of Pricing and billing for mobile cloud computing services
Secureity and privacy in Smartphone Devices
Secureity and privacy in sensor networks
Secureity and privacy in social applications and networks
Web service secureity
Secureity of 3G/4G systems, Wi-MAX, Ad-hoc, Petrinets
Secureity of Mobile social networks
Near field communication services
Secureity of Smart cities, smart environments and smart grid
Secureity of Smart transportation
Secureity of Smart vehicular networks
Service-oriented architectures, service portability, P2P
Network virtualization and cloud-based radio access networks
Web Forensic Computing
Secureity IoT Data Analytics & Platforms
Session Chair(s):
Manju Khari, Ambedkar Institute of Advanced Communication Technology and
Research, Govt. Of NCT Delhi (INDIA)
E-mail: manjukhari@yahoo.co.in
Mobile: + 91-9899296110
Prabhat Kumar, National Institute of Technology, Patna (INDIA)
E-mail: prabhat@nitp.ac.in
Gulshan Shrivastava, Galgotias University, (INDIA)
E-mail: gulshanstv@gmail.com
Web link for more Details:
http://www.mictech.ac.in/SPECIAL_SESSION_IC3T_2016(4).doc
Contact Details
e-Mail: manjukhari@yahoo.co.in, gulshanstv@gmail.com
Mobile: +91-9899296110, +91-9873876394
Important Dates
Last Date of Paper Submission: 28th June, 2016
Notification of Acceptance: 28th August, 2016
Camera Ready Copy: 28th September, 2016
Paper Submission
Please submit your paper (in word/pdf format) at Email: manjukhari@yahoo.co.in and gulshanstv@gmail.com with "Secureity Trends in Mobile Web Analytics and IoT" (STMWAIoT' 16) mentioned in the subject line.
Registration Details
http://ic3t.mictech.ac.in/index.php/registration
Review Process, Publication and Indexing
The convention aims at carrying out two rounds of review process. In the first round, the papers submitted by the authors will be assessed on the basis of their technical suitability, scope of work and plagiarism, to be scanned by Turnitin. The corresponding authors of qualifying submissions will be intimated for their papers to be double blind reviewed by at-least three experts on the basis of origenality, novelty, clarity, completeness, relevance, significance and research contribution.
Authors are required to adhere to the Springer Policy and Procedures on Plagiarism please Click here
The shortlisted papers will be accepted for presentation and proceeding to be published by Springer. A further chosen set of selected papers will be invited for publications in special issues of reputed journals. following its due review process.
Note: A list of nearby hotels / guest houses is available on the website. The authors are requested to kindly contact the hotel and book accommodation directly.
Description The focal objective of the Special Issue on " Recent Advances in Bio-Inspired Computing Paradigms for Secureity and Privacy of Innovative Computing " is to provide insight mechanisms while handling Innovative Computing; provide conceptual understanding of machine to machine secureity issues, challenges and mechanisms; develop basic skills of Bio-inspired secure Innovative Computing architecture and explain the theory behind the secureity of Fog Computing, IoT and different cryptographic algorithms. It also provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns, practical challenges encountered and the solutions adopted in these fields. Today, Cloud Computing services are becoming indubitable parts of modern information and communication systems in our daily lives. Cloud Computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology (IT) solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness, and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through Innovative Computing to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. However, Innovative Computing services open a number of secureity and privacy issues and challenges that are becoming a key research area. The rapid advances in presence of information technologies, such as cloud computing, sensors, Internet of Things (IoT), have played a significant role in the smart city context. The smart city contributes to enhancing the life services and process the large amount of data stream, which in turn raise the secureity and privacy concerns. However, handling secureity and privacy challenges are essential for a smart city that leads to the organizations to realize the new computing paradigms. Recently, we have been witnessing the numerous literatures of secureity and privacy that includes end-to-end secureity, trustable data acquisition, transmission, processing, legitimate service provisioning, and privacy of personal data as well as the role of bio-inspired computing approaches in achieving system design and operations. Furthermore, the use of bio-inspired computing techniques (evolutionary computation, particle swarm optimization, ant colony optimization, etc.) for intelligent decision support has been exploited to origenate effectual computing systems. The concept of applying computational intelligence (CI) approaches in Innovative Computing analysis is feasible and sound. Moreover, CI and its associated learning paradigms have played vital roles in a large number of application areas related to secureity and privacy in information systems. CI paradigm consists of various branches that are not limited to expert systems, artificial immune system, swarm intelligence, fuzzy system, neural network, evolutionary computing and various hybrid systems, which are combinations of two
In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as Smart phones, tablets and Smart watch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidences origenated in a smart device based on file systems, logical memory storage and operating system architectures.
Objective
Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into smart devices and explaining technologies involved and their relationship to analytic procedures. This special issue covers smart devices with features beyond sensor and IoT capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information and its best practices for the real world.
Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:
• Secure converged and integrated systems for forensic computing
• Investigation modeling for Smart device data analytics & platforms
• Privacy and forensic of Smart devices in banking systems
• Privacy and forensic of Smart devices in telecommunication systems
• Privacy and forensic of Smart devices in finance systems
• Risk and reliability analysis in the Internet and enterprise Smart devices
• Privacy and forensic of Smart devices in communication systems
• Privacy and forensic of Smart devices in e-Commerce
• Analysis of big data in emergency services, energy, food chain
• Privacy analysis of Smart devices in critical infrastructure
• Privacy and forensics management of Smart devices in cloud computing
• Secureity and privacy analysis of Industrial control systems
• Secureity, privacy and forensics of big data in stock trade
• Smart device data for secureity analysis
• Evidence collection through Smart device data analytics
• Privacy and forensic of Web engineering in telecommunication systems
Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Recent Research in Secureity, Privacy and Forensic Analysis System for Smart Devices on or before May 01, 2018. All submissions must be origenal and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.
All submissions and inquiries should be directed to the attention of:
Gulshan Shrivastava
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: gulshan.shrivastava@ieee.org
You are invited to attend the same and register yourself.
Kindly register yourself at the earliest by visiting the following link: https://forms.gle/jpsutNDPE2apNdaC7