Special Issue on: "Meta-Heuristics for Security, Reliability and Trust"
Dr. Bernabé Dorronsoro, Dr. Grégoire Danoy, Dr. Johnatan E. Pecero, Dr. Marcin Seredynski and Prof. Dr. Pascal Bouvry, University of Luxembourg, Luxembourg
The increasing complexity of recent systems and networks has raised new concerns in terms of security, reliability and trust. Indeed, the past few years have seen a significant increase in cyber attacks on the Internet, resulting in degraded confidence and trust in the use of Internet and computer systems.
In light of this, there is an increasing demand for measures to guarantee the privacy, integrity, and availability of resources in distributed systems such as grid and P2P systems. Furthermore, as heterogeneous computing systems such as grid and cloud systems become larger and larger, reliability issues of such systems need to be addressed. For the execution of applications in these systems, it is becoming increasingly important to provide reliable scheduling by evaluating the reliability of resources.
These new problems require dependable systems and networks which can intelligently react to abnormal situations and ensure the security, reliability, quality and trustworthiness of information. In the case of reliable scheduling, two important issues need to be considered: how to evaluate the reliability of a resource, and how to perform reliable scheduling based on the reliability information of a resource. Meta-heuristics provide a way to develop such techniques, algorithms, protocols and tools in different aspects such as authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems.
This special issue convenes research in the areas of security, reliability, trust and meta-heuristics. We seek to collect the most recent advances in meta-heuristics (genetic algorithms, ant colony algorithms, particle swarm optimisation, etc.) which are applied to security, reliability and trust.
Both theoretical papers and papers describing practical experiences are welcome.
Suitable topics include but are not limited to:
- Security, reliability and trust:
- Intrusion detection
- Cryptography, cryptanalysis
- Security protocols
- Quality of services
- Trust management
- Software validation and verification
- Certification of results
- Reliable scheduling
- Genetic algorithms
- Genetic programming
- Evolution strategies
- Evolutionary programming
- Simulated annealing
- Tabu search
- Ant colony optimisation
- Particle swarm optimisation
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (Conference papers may only be submitted if they were not originally copyrighted and if they have been completely re-written.)
All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page.
Submission deadline: 20 February, 2013 (extended)
First notification: 15 March, 2013
Notification of acceptance: 15 June, 2013
Final version: 15 July, 2013
Editors and Notes
All papers must be submitted online. To submit a paper, please read our information on preparing and submitting articles. If you experience any problems submitting your paper online, please contact firstname.lastname@example.org, describing the exact problem you experience. Please include in your submission the title of the Special Issue, the title of the Journal and the names of the Guest Editors