Call for Book Proposals in all areas of Information Security
Oklahoma International Publishing (OKIP), USA, accepts manuscript (edited books, monographs, encyclopedias, handbooks, textbooks, thesis...) proposals with advanced and innovative topics related, but not limited, to areas and fields below.
All book’s contents are peer-reviewed before expedited publication by OkIP in the Chronicle of Computing series and registration, abstraction, and fast submission for potential indexation (Crossref™, Scopus®, Web of Science™).
Publication and Copyright: 2023/2024
>> IS Modeling and Design
- Information Security (IS) Architecture Design
- IS Authentication and Privacy Control
- IS Frameworks and Protocols
- IS Architecture Design and Testing
- Data Breach Protection
- Information Systems Security
- Information Analytical Models
- IS Modeling and Analysis
- Critical Information Management
- IS Performance, Requirements, and Issues
- Security Information Sharing
>> AI in Security
- AI/ Machine Learning for Security
- Cryptographic Checksums and Algorithms
- Risk and Reputation Management
- Malware Detection and Response
- Vulnerability Analysis and Countermeasures
- Intrusion Detection and Anomaly Recovery
- Information/Temporal Access Controls
- Vulnerability Detection
- Improved Authentication Process
- Information Hiding and Anonymity
- Behavioral Biometrics
- Security Situational Awareness
>> Security and Distributed Systems
- Edge Computing Security
- Trusted Computing | Crowdsourcing
- Cyber-physical Systems Security
- Distributed Systems Security
- Embedded Systems Security
- IS Virtualization and Data Center Network
- Secure Internet Connectivity
- Cloud Security and Adoption Risks
- Physical-layer Security
>> Wireless and Digital Forensics
- Trust Authority Distribution
- Wireless Network Information Assurance (IA)
- Bluetooth Information Assurance
- Radio Frequency Fingerprints
- Intelligent Forensic Systems
- Honeypot Deception and Forensics
- Steganography Techniques
- Cyber-Attack Thwarting
- Crime Data Mining
- Anti-Spam Filtering Techniques
- Untrusted Hardware Testing
- Privacy Preservation and Protection
- Intelligent and Secure Autofill Systems
>> IA and Information Warfare
- Secure Passport System
- Insider Threat Prediction
- Key Management and Recovery
- Critical Infrastructure Protection
- Threat Awareness Analysis
- Traffic Flow Confidentiality
- Intellectual Property Protection
- Cyber-Attack and Cyber-Terrorism
- Tamper Detection and Prevention
- Physical Security and Soldier Security
- Electromagnetic Bomb and Electronic Attack
- Tactical Communication and Network Security
>> IS & IA Applications
- Electronic Voting System
- Signature Verification
- Parental Control Systems
- Biometric Protection
- Watermarking Techniques
- Secure Diagnostic
- Mobile Security | Database Security
- Intelligent and Secure Autofill System
- Energy Harvesting Security
- IS & IA Awareness and Education
- Green Communications Security
- Power Information System Security
- Corporations and Businesses Protection
- Internet of Things Security
- Software Security Assurance
>> IS & IA Policy and Legal Issues
- IS & IA Policy Approaches
- IS & IA Enforcement Models
- Cybersecurity Legal
- Regulatory Issues
- Digital Rights Management
- Ethics, Identity, and Trust Management
- Steganography Legal Issues
>> Proposals Submission/Notification due Date
- Submission July 15, 2022 -> Notification August 1, 2022
- Submission August 15, 2022 -> Notification September 1, 2022
- Submission September 15, 2022 -> Notification October 1, 2022
- Submission October 15, 2022 -> Notification November 1, 2022
- Submission November 15, 2022 -> Notification December 1, 2022
- Submission December 15, 2022 -> Notification January 1, 2023
>> Proposal Submission Link
https://eventutor.com/event/30/abstracts/#submit-abstract
>> Proposal Should Include:
- Book type and three potential titles
- Keywords (7-9) and publication type
- Book format (length, # of chapters)
- Author/editor information and CVs
- Book timeline and marketing plan
- Short abstract and table of contents
- Target audience and competing titles
- Tentative Table of Content (for monograph only)
- Recommended Topics (40-100) (for non monograph)
>> Publication Types (A or B)
A) Open Access Books
- Authors/Editors pay all processing charges
- Copyright remains with the authors
- Authors can share content everywhere
- Contents are free to download
B) Traditional Books
- Publisher pays processing charge
- Copyright transfers to the publisher
- Contents are pay-to-download
- Title/abstracts are shared everywhere
>> Book Types
- Monograph: Detailed study of a single subject written by expert authors
- Edited book: Chapters with original research by different authors
- Encyclopedia: Multi-volumes, short chapters, current issues, solutions, and future directions
- Handbook: Long chapters from leading experts covering cutting-edge and trending concepts
- Textbook: Texts designed to introduce new basics or advanced subjects
>> Editorial Support
- Full publishing support
- Online hosting of published contents
- Free use of Eventutor submission system
- Discounts/incentives to Authors/Editors
>> Contact
Please feel free to contact the OkIP team for any inquiries at: info@okipublishing.com
All book’s contents are peer-reviewed before expedited publication by OkIP in the Chronicle of Computing series and registration, abstraction, and fast submission for potential indexation (Crossref™, Scopus®, Web of Science™).
Publication and Copyright: 2023/2024
>> IS Modeling and Design
- Information Security (IS) Architecture Design
- IS Authentication and Privacy Control
- IS Frameworks and Protocols
- IS Architecture Design and Testing
- Data Breach Protection
- Information Systems Security
- Information Analytical Models
- IS Modeling and Analysis
- Critical Information Management
- IS Performance, Requirements, and Issues
- Security Information Sharing
>> AI in Security
- AI/ Machine Learning for Security
- Cryptographic Checksums and Algorithms
- Risk and Reputation Management
- Malware Detection and Response
- Vulnerability Analysis and Countermeasures
- Intrusion Detection and Anomaly Recovery
- Information/Temporal Access Controls
- Vulnerability Detection
- Improved Authentication Process
- Information Hiding and Anonymity
- Behavioral Biometrics
- Security Situational Awareness
>> Security and Distributed Systems
- Edge Computing Security
- Trusted Computing | Crowdsourcing
- Cyber-physical Systems Security
- Distributed Systems Security
- Embedded Systems Security
- IS Virtualization and Data Center Network
- Secure Internet Connectivity
- Cloud Security and Adoption Risks
- Physical-layer Security
>> Wireless and Digital Forensics
- Trust Authority Distribution
- Wireless Network Information Assurance (IA)
- Bluetooth Information Assurance
- Radio Frequency Fingerprints
- Intelligent Forensic Systems
- Honeypot Deception and Forensics
- Steganography Techniques
- Cyber-Attack Thwarting
- Crime Data Mining
- Anti-Spam Filtering Techniques
- Untrusted Hardware Testing
- Privacy Preservation and Protection
- Intelligent and Secure Autofill Systems
>> IA and Information Warfare
- Secure Passport System
- Insider Threat Prediction
- Key Management and Recovery
- Critical Infrastructure Protection
- Threat Awareness Analysis
- Traffic Flow Confidentiality
- Intellectual Property Protection
- Cyber-Attack and Cyber-Terrorism
- Tamper Detection and Prevention
- Physical Security and Soldier Security
- Electromagnetic Bomb and Electronic Attack
- Tactical Communication and Network Security
>> IS & IA Applications
- Electronic Voting System
- Signature Verification
- Parental Control Systems
- Biometric Protection
- Watermarking Techniques
- Secure Diagnostic
- Mobile Security | Database Security
- Intelligent and Secure Autofill System
- Energy Harvesting Security
- IS & IA Awareness and Education
- Green Communications Security
- Power Information System Security
- Corporations and Businesses Protection
- Internet of Things Security
- Software Security Assurance
>> IS & IA Policy and Legal Issues
- IS & IA Policy Approaches
- IS & IA Enforcement Models
- Cybersecurity Legal
- Regulatory Issues
- Digital Rights Management
- Ethics, Identity, and Trust Management
- Steganography Legal Issues
>> Proposals Submission/Notification due Date
- Submission July 15, 2022 -> Notification August 1, 2022
- Submission August 15, 2022 -> Notification September 1, 2022
- Submission September 15, 2022 -> Notification October 1, 2022
- Submission October 15, 2022 -> Notification November 1, 2022
- Submission November 15, 2022 -> Notification December 1, 2022
- Submission December 15, 2022 -> Notification January 1, 2023
>> Proposal Submission Link
https://eventutor.com/event/30/abstracts/#submit-abstract
>> Proposal Should Include:
- Book type and three potential titles
- Keywords (7-9) and publication type
- Book format (length, # of chapters)
- Author/editor information and CVs
- Book timeline and marketing plan
- Short abstract and table of contents
- Target audience and competing titles
- Tentative Table of Content (for monograph only)
- Recommended Topics (40-100) (for non monograph)
>> Publication Types (A or B)
A) Open Access Books
- Authors/Editors pay all processing charges
- Copyright remains with the authors
- Authors can share content everywhere
- Contents are free to download
B) Traditional Books
- Publisher pays processing charge
- Copyright transfers to the publisher
- Contents are pay-to-download
- Title/abstracts are shared everywhere
>> Book Types
- Monograph: Detailed study of a single subject written by expert authors
- Edited book: Chapters with original research by different authors
- Encyclopedia: Multi-volumes, short chapters, current issues, solutions, and future directions
- Handbook: Long chapters from leading experts covering cutting-edge and trending concepts
- Textbook: Texts designed to introduce new basics or advanced subjects
>> Editorial Support
- Full publishing support
- Online hosting of published contents
- Free use of Eventutor submission system
- Discounts/incentives to Authors/Editors
>> Contact
Please feel free to contact the OkIP team for any inquiries at: info@okipublishing.com