Call for Chapters
Edited Book on
Volume 1 - “Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence”
Published
https://www.igi-global.com/book/dark-web-pattern-recognition-crime/286781
Call for Chapters
Edited Book on
Volume 1 - “Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence”
Published
https://www.igi-global.com/book/dark-web-pattern-recognition-crime/286781
Please Share the Book Chapter Call among all your contacts
Book Title: “Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence”
Publisher: IGI Global
Indexing: Web of Science, Scopus
Status: Approved
Link for Submission - https://www.igi-global.com/publish/call-for-papers/call-details/5506
Chapter Template
https://www.igi-global.com/publish/contributor-resources/before-you-write/
Editors: Romil Rawat (India) ,Jean-François Mascari (France) ,Vinod Mahor (India) ,Shrikant Telang (India ) , Kiran Pachlasiya (Maravi), (India)
Proposals Submission Deadline: October 6, 2021
Full Chapters Due: November 15, 2021
Submission Date: November 15, 2021
Details
To find and analyze cyber crime at Social media and hidden part of Internet, even not known by normal users, using Modern Computer technique. The data stealing is the major concern at Internet, and hacker or criminals using simple tricks to hack the social network. The present book will outline all those methods and issues. The technological advancement using Machine Learning, Artificial Intelligence and Intelligent Hardware based design created cyber warfare among security agencies and cyber criminals (terrorist organizations) to create web shield and protection against tracking, Cyber attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether a sort of counter measure or another is taken. All together for a fruitful treatment of the present circumstance, it is vital to have a forecast of cyber attacks, proper safety measures, and viable use of cyber intelligence that empowers these activities. Malevolent hackers share different sorts of data through specific networks, for example, the dark web, showing that a lot of intelligence exists in cyberspace.
Recommended topics include, but are not limited to, the following
· Automated Techniques for Predicting Dark Web Crime and Terrorist Global automated Network.
· Artificial Intelligence and Machine Learning applications in Dark Web Crime recognition.
· Detection of Terrorist Events with focused on delivery of Illicit Product and Ordered Crime Conduction.
· Malicious Content Crawling Framework in Dark Web Environment.
· Generation of Illicit Product and Dealer Details Involved in Criminal Activities.
· Intelligent networks for tracking Illicit and Terrorist Activities at Online Social Network.
· Fog Computing Analysis For Crime Incident Detection Based On ML Model.
· Cyber Trafficking and Threat behavior forecasting.
· Analysis of Hidden criminal recruiters at Social Media using Computational Intelligence.
· Malware pattern and activity monitoring for malicious activities towards financial organizations.
· Malware framing by cyber criminals at CPS.
· System control and capturing based vulnerability modeling at Darkweb using ML.
· Dark web analysis for tracing extremist activities.
· International terrorism and recruitment channels link prediction.
· Smart devices and Internet of Vehicle framework monitoring.
· Evaluation for vulnerability detection in IoT systems.
· Autonomous systems of AI for fraud detection.
· Forensics in Dark Web environments.
· Internet of Things: Security Challenges and Concern for cyber vulnerability.
· Identification of Vulnerable Signature and Fingerprint at Network.
· Network Traffic Analysis.
· Oil and Gas stations susceptibility originated by dark web criminals.
· Hacking of smart applications based on IoT relating to Decision support systems.
· Pattern and algorithms for attacking with learning Paradigm.
· Designed Algorithms and methods for defending adversarial attacks.
· Business data and Medical/health informatics security and Dark Web Pattern Recognition.
· Darkweb threat analysis at Biological designed frameworks.
· Biometric anomaly recognition for vulnerability.
· Darkweb Pattern Recognition for analyzing clouds using fuzzy logic.
· Suspicious pattern recognition based on cryptographic technique at Darkweb platform.
· Automated engines for detecting malicious patterns using Computer Vision.
· Knowledge representation modeling using Computational Intelligence for crime analysis at Dark Web Platform.
· Crowdfunded assassinations and Propaganda by Darkweb cyber criminals.
· Internet of Vehicle framework monitoring for criminal activities.
· Human Trafficking trade network identification using Advance algorithms.
· Designing of Online Covert Operation at Darkweb for identifying illicit trade and agents.
· Designing of intelligent Crawlers for indexing Anonymous Contents and IP.
· Games application in Dark Web Crime.
· Top-level domain suffix .onion orientation for criminal activities.
· Fuzzy Systems and Evolutionary Computation techniques in Crime Prediction at Dark Web Environment.
Process of Submission
· Click on Propose a Chapter Tab and Follow the new page guideline.[ It’s good to Create account first at IGI Global].
· Enter the Chapter Details (Abstract or Introduction first), after review by committee, notification will be sent to submit the full chapter.
· Create an Online Account at IGI Global and submit a full Chapter.
Call for Chapter Details:
https://www.igi-global.com/publish/call-for-papers/call-details/5506
Submission Link:
https://www.igi-global.com/publish/call-for-papers/submit/5506
Romil Rawat, Shri Vaishnav Vidyapeeth Vishwavidyalaya, India
Vinod Mahor, NRI Institute of Science and Technology, India
Shrikant Telang, Shri Vaishnav Vidyapeeth Vishwavidyalaya-Indore, India
Kiran Pachlasiya (Maravi), NRI Institute of Science and Technology, India
Inquiries
Romil Rawat [ rawat.romil@gmail.com ]