-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, yes, it is very common:
http://www.crypto.com/blog/copywrongs/ Justin C. Klein Keane http://www.MadIrish.net Any digital signature on this message can be confirmed using the GPG key at http://www.madirish.net/gpgkey On 08/09/2013 06:08 AM, Bart van Tuil wrote: > I am shocked, i am. ... Is this common practice?! > > > > Alex, vrijdag 9 augustus 2013 10:51 > > Elsevier sells the journals to universities for crazy amounts (the > top 10 from university of karlsruhe can be seen here > http://www.bibliothek.kit.edu/cms/teuerste-zeitschriften.php with > 20000 Euro beeing the most expensive one). Althought you submit > your paper for free (or even pay for "corrections"). > > Please consider boycotting Elsevier (like these guys > http://www.economist.com/node/21545974). > > Doing the right thing > impact factor. > > > > Am 2013-08-09 09:26, schrieb Konrad Rieck: > > CALL FOR PAPERS > > > > Special Issue on Threat Detection, Analysis and Defense > > Journal of Information Security and Applications > > > > Please consider the following opportunity to submit and publish > > original scientific results to a special issue of the Journal of > > Information Security and Applications (Elsevier) on "Threat > Detection, > > Analysis and Defense" > > > > The submission deadline is September 30, 2013. > > > > http://bit.ly/13ku0Ga > > http://ees.elsevier.com/jisa/ > > > > > > TOPICS > > > > This special issue is intended to bring forth the recent > advancements > > in the detection, modeling, monitoring, analysis and defense of > > various threats posed to sensitive data and security systems from > > unauthorized or other inappropriate access. Areas to be covered > > include but are not limited to: > > > > * Monitoring: Novel tools and techniques for monitoring mounting > threats > > including monitoring of ongoing attacks. > > * Detection solutions: Innovations in the detection of intrusions, > > malware and its activity, including post-attack forensics. > > * Infrastructure: Improvements in network traffic security analysis > for > > identification of threats. > > * Threat modelling: Advances in the tools, technologies and > processes > > used in anticipating attacks. > > * Emergent problems: New threats resulting from new business models > for > > transfer of value, from gold-farming to Paypal and Bitcoins. > > * Security designs: Innovations in security architectures, > approaches > > and systems responding to specific emerging threats. > > > > > > IMPORTANT DATES > > > > * Paper submission: September 30, 2013 > > * First-round notification: November 30, 2013 > > * Revision: January 13, 2014 > > * Final decision: March 14, 2014 > > * Submission of final paper: April 14, 2014 > > * Publication date: July 2014 > > > > > > SUBMISSION DETAILS > > > > Paper submissions for the special issue should follow the > submission > > format and guidelines for regular papers submitted to Journal of > > Information Security and Applications (JISA). All the papers will > be > > peer-reviewed following the JISA reviewing procedures. > > > > > > GUEST EDITORS > > > > Alan Woodward > > Charteris plc and University of Surrey, UK > > alan.woodward (AT) surrey.ac.uk > > > > Andrew Rogoyski > > Roke Manor Research Ltd, UK > > andrew.rogoyski (AT) roke.co.uk > > > > Konrad Rieck, > > University of Goettingen, Germany > > konrad.rieck (AT) uni-goettingen.de > > > > Shujun Li > > University of Surrey, UK > > Shujun.Li (AT) surrey.ac.uk > > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > > > > > _______________________________________________ Full-Disclosure - > We believe in it. Charter: > http://lists.grok.org.uk/full-disclosure-charter.html Hosted and > sponsored by Secunia - http://secunia.com/ > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iPwEAQECAAYFAlIE3/4ACgkQkSlsbLsN1gA5aQb8CDQgYiwUJFoiWHFRLsiA8ADZ pTISEi5zuAp2COZJd9Wjlu+dc/2HEPG2xcHHJ00DB6X5doNti1ubc0nBfeZy6A9A CCQfjJHUiw25NrFvmoEpayXvDrkIHLdqER/jVa1IT0ep8j6rIugAT6gp5h5xuMst FiQtl6VtxxCwLqqeI3BS+AhOiFHaGUZrbLEkGoM8GZciq3BpsiHiAselIjRBaHP8 eH8+iI6Hl89vkH53NuuCMdvUFifyy9TV8hZc8ZMC4nlu+eZAu+GA9nqNpJULNOl6 WDqJGG+o5iZWrB2Acg4= =QQJ+ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/