<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:8pt">Special issue on Cybersecurity, Cybercrime, Cyberwarfare<br><br>Guest editor: Sherali Zeadally, University of Kentucky, USA<br><br>Journal of Homeland Security and Emergency Management<br><br>Journal web site: http://www.degruyter.com/jhsem<br><br>Editor-in-Chief: Dr. Renda-Tanali, Irmak; Managing Editor: Dr. McGee, Sibel<br><br><br>SCOPE<br><br>Over the recent decades, we have witnessed tremendous advances in computing, communications, and hardware <br>and software technologies, all of which continue to fuel the development, growth, and importance of cyberspace. <br>Today, governments and industry heavily depend on cyberspace for many of their daily operations. <br>Critical infrastructures are increasingly characterized by cyber interdependencies through their growing <br>reliance on
computerized control systems that use and sustain electronic and informational linkages. <br>Cyberspace is also playing an important role in the personal lives of citizens around the world. <br>The social and economic well-being of all societies now depend on the safe, secure, and reliable <br>functioning of cyberspace. Such increased connectedness, however, puts the security of cyberspace <br>and critical personal, corporate, and national assets under the constant threat of criminal <br>and terrorist activities. Ranging from corporate espionage to hacking into systems that contain <br>nationally significant intelligence, cybercrimes and cyberwarfare are on the rise. The protection <br>of cyberspace has become a national priority for many nations. As a result, cybersecurity research <br>has been receiving a lot of attention from government, industry, and academia.<br><br>The goal of this special issue is to present state-of-the-art research results in
the <br>areas of cybersecurity, cybercrime, and cyberwarfare. We are particularly interested in <br>innovative, scalable, cost-effective solutions that can improve the security and resiliency of cyberspace. <br>Solutions that adopt a multidisciplinary approach are particularly encouraged. Research areas <br>of relevance would therefore include (but not be limited to) the following topics:<br><br>• Cybersecurity incident response<br>• Cybersecurity economic modeling and metrics<br>• Cybersecurity standards, policy, law, and regulation<br>• Cyber risk and vulnerability assessment<br>• Cybercrime<br>• Cyber warfare <br>• Cybersecurity education<br>• Cyber forensic tools, techniques, and analysis<br>• Cyber threat modeling analysis<br>• Visual analytics for
cybersecurity<br>• Cybersecurity testbeds, tools, methodologies <br>• Active and passive cyber defense techniques<br>• Insider threat detection and prevention<br>• Critical infrastructure protection<br>• Intrusion detection and prevention<br>• Botnet detection and mitigation<br><br><br>IMPORTANT DATES<br><br>Deadline for paper submission: May 1, 2014<br>Notification of acceptance: July 1, 2014<br>Expected publication date: 2014<br><br><br><br>SUBMISSION<br><br>All submitted papers (limited to a maximum of 16 pages) must be written in English. <br>We invite submission of original research articles—that is, articles that present research <br>that has not been previously published nor is currently under review by other journals <br>or conferences/symposia/workshops. Papers previously published as part of conference/workshop
<br>proceedings may be considered for publication in the special issue, provided that they are <br>modified to contain at least 40 percent new/original content. Authors of such submissions <br>must clearly indicate in a separate letter to the guest editor at the time of submission <br>how their papers have been altered for this special issue. Moreover, authors must <br>acknowledge their previous papers in the manuscript and resolve any potential copyright <br>issues prior to submission.<br><br>All submissions will be reviewed by the guest editor, as well as by JHSEM senior <br>editors and anonymous referees. <br><br>Formatting instructions and author guidelines for preparing the manuscript can be <br>found at http://www.degruyter.com/jhsem. All manuscripts should be submitted <br>through http://mc.manuscriptcentral.com/dgjhsem. The author(s) must clearly state in <br>the cover letter that the paper is being submitted to the special
issue.<br><br><br><br>GUEST EDITOR<br><br>Sherali Zeadally<br>314 Little Library Building<br>College of Communication and Information<br>University of Kentucky<br>Lexington, KY 40506-0224<br>USA<br><br>Email: szeadally@uky.edu<br><br><br><div></div></div></body></html>