Taylor & Francis Call for Chapters 2013 : Case Studies in Intelligent and Secure Computing – Achievements and Trends (Two Vols)

full name / name of organization: 
Dr.Biju Issac, Teesside University, Middlesbrough, UK
contact email: 

We would like to bring your attention to TWO edited books as follows: (1) Case Studies in Intelligent Computing – Achievements and Trends (2) Case Studies in Secure Computing – Achievements and Trends. These books would be published by CRC Press, Taylor and Francis and is anticipated to be in print by December 2013. We kindly request you to contribute chapters for these books based on your research area.

The Editors:
Dr.Biju Issac, Teesside University, Middlesbrough, UK
Dr.Nauman Israr, Teesside University, Middlesbrough, UK

Scope of the Edited Books:
Most of the software applications that we work with need to be intelligent or secure in itself or should have a combination of these features. The research that is happening along these fields can be better understood through application of these principles in different case study scenarios.

Relevance of Intelligent Computing: Any intelligent software can come to decisions and conclusions on its own, based on a trained data set – which makes Artificial Intelligence (AI) a primary area of research these days. AI is the study and design of a system that understands its environment and takes actions that maximize its chances of success. In most cases it is an application intelligence that evolves over time and gets better with fewer errors. In others it can be an intelligence derived out of a set of options or constraints. Software that can intelligently find solutions to tough problems is always growing in relevance. AI thus has implications in most areas of applied computing. How can we better understand such intelligent applications and scenarios?

Relevance of Secure Computing: With network proliferation through wireless and mobile computing, security is of paramount importance. That makes security a primary goal for many software applications, especially those which involve network interactions at different levels of TCP/IP reference model. Apart from network security, other security issues with the technology in use need to be addressed too. Even in the recent past we heard of security attacks against Sony, Facebook, Twitter, Apple etc. With such growing attacks, how can we be sure that we are safe?

We would like to assemble case studies in intelligent computing and secure computing as two edited volumes. These books seek to gather the latest research from prominent researchers from all over the world. Since these books will cover case study based research findings, it can be quite relevant to researchers, university academics, scientists, computing professionals and curious university students.

The topics of interest for the first book include, but are not limited to the following:

A. Book: Case Studies in Intelligent Computing – Achievements and Trends
• AI in Interactive Computing
• Fuzzy Logic and systems
• Heuristic and AI Planning Strategies and Tools
• Computational Theories of Learning
• Hybrid Intelligent Systems
• Information Retrieval
• Intelligent System Architectures
• Knowledge Representation
• Knowledge-based Systems
• Neural Networks and information processing
• Supervised and Unsupervised learning
• Pattern Recognition systems
• Evolutionary Computing
• Genetic Programming
• Pervasive computing and Ambient intelligence
• Reasoning and Evolution
• Semantic Web Techniques and Technologies
• Web Intelligence Applications and Search
• Intelligent image processing
• Particle Swarm Optimization and Niche Technology
• Swarm Intelligence and Optimization
• Kernel Methods and Supporting Vector Machines
• Independent Component Analysis and Blind Source Separation
• Biology Inspired Computing and Optimization
• Nature Inspired Computing and Optimization
• Knowledge Discovery and Data Mining
• Artificial Life and Artificial Immune Systems
• Machine Learning Theory and Methods
• Natural Language Processing and Computational Linguistics
• Intelligence in Bioinformatics
• Intelligence in Signal Processing
• Intelligence in Biometrics Recognition
• Intelligence in Image Processing
• Intelligence in Robotics
• Intelligence in Computer Vision
• Intelligence in Finance/Banking
• Intelligence in Communication Networks
• Intelligence in Social Networking
• Intelligent Control and Automation
• Intelligent Image/Document Retrievals
• Intelligent Data Fusion and Information Security
• Intelligent Prediction and Time Series Analysis
• Intelligent Agent and Web Applications
• Intelligent Sensor Networks
• Intelligent Fault Diagnosis
• Securing Intelligent Applications

The topics of interest for the second book include, but are not limited to the following:

B. Book: Case Studies in Secure Computing – Achievements and Trends
• Mobile and wireless security
• Network Protocol attacks and prevention
• Multimedia security
• Cyber-security
• Denial of Service and DDoS attack protection
• Intrusion detection and prevention
• Database security
• Web applications security
• Security policy, model and architecture
• Security in social networks
• Security in mobile and wireless communications
• Privacy and anonymous publishing
• Security protocols for peer-to-peer networks
• Secure Online Voting
• Digital Cash and payment system
• Malware and Virus attack and security
• DNS Vulnerabilities and security
• Spoofing attacks and security
• Phishing attacks and security
• Cheat mitigation in Online games
• Cryptography and Steganography applications
• RFID related Security
• Captcha Security
• Secure protocols
• Sybil Attacks and security
• Biometric Security
• VoIP Security
• Secure Content Delivery
• Anonymous Communications
• Automated IDS Signature Generation
• Anonymity in Wireless Sensor Networks
• Botnet Detection
• Node Replication Attack in Wireless Sensor Networks
• Secure Data Aggregation in Wireless Sensor Networks
• Privacy issues in Social Networks
• Google Android smartphone security
• P2P BotNet Detection
• Taint Mechanism
• Browser Security
• Privacy of Location Based Services
• AI application in Secure Computing

We especially welcome chapters that combine both intelligence and security – like intelligent solutions to secure computing or securing intelligent systems.

In summary, the objectives of these TWO books are to:
1. Capture the recent work and achievements in intelligent computing research through case studies, where the success of machine learning and artificial intelligence computing application in different scenarios (as indicated in topics listed) would be dealt with. It will assemble various applications of AI in different fields. The challenges faced and solutions proposed by different researchers in this area would be discussed.
2. Compile the recent work and findings in secure computing research through case studies, where the growing security attacks and countermeasures (as indicated in topics listed) in stand-alone and networking world would be explained, along with other pertinent security issues with the technology of the application itself. It will seek to capture a number of applications of secure computing done. The challenges faced and solutions proposed by different researchers in this area would be discussed.

Manuscript guidelines:
Refer to the CRC Press, Taylor and Francis link at the website: http://www.crcpress.com/resources/downloads/AUTHORS_Pub_With_CRC_disk_bo...

Submission and Important Dates:
Prospective authors are encouraged to send a brief abstract or plan of their chapter at the earliest to Dr.Biju Issac as email (bissac@ieee.org), so as to get some initial comments. Final chapter submissions can also be done to bissac@ieee.org. The submitted chapters would be peer-reviewed and feedback given.

Final draft chapters due: 31 July 2013 (with some flexibility)
Chapter acceptance notification: 15 October 2013
Camera ready chapters due: 15 November 2013
Publication of the books: December 2013 (tentative date)

Contact Information:
Dr.Biju Issac
School of Computing
Teesside University
Tees Valley
Email: bissac@ieee.org