Call for Chapters: Cyber-Malware

Springer Nature


This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips you with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. The book will discuss theoretical, technical, and practical issues related to cyber malware attacks and defense making it an ideal reading material for students, researchers, and developers.

Important Dates

● Full-length paper submission: May 15th, 2022

● Notification of first decision: June 30th, 2022

● Revision: August 30th, 2022

● Final Decision: September 30th, 2022

● Camera-ready: October 30th, 2022

Important Info

● Check submission instructions here

● Check CFP Brochure


The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The apparent asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, making the attack surface dynamic, automating the attack detection, risk assessment & mitigation, and investigating the prediction and prevention of malware attacks with the utilization of emerging technologies like blockchain, artificial intelligence, and machine learning.

Tentative Chapters

  • Malware Generation and distribution: New families and Emerging approaches
  • Malware Analysis: New Trends, Emerging Techniques, and Challenges
  • Malware classification using machine learning algorithms
  • Malware Analysis using Blockchain and AI Technologies
  • Malware Analysis for IoT and Smart AI-based Applications
  • Automated Malware Detection Based on AI Tools
  • Malware Forensics Tools
  • Malware Ontology
  • Role of Cryptography and Steganography Algorithms in Anti-Malware Applications
  • SDN-based Malware Detection and Mitigation OR [Deep Learning Algorithms for Malware Detection in SDN-Based IoT Infrastructures]
  • Applications of Multimedia Processing in Malware Analysis
  • Cybersecurity Challenges for Malware Intrusion Detection
  • Recent Optimization Algorithms-Based Lightweight Malware Recognition
  • Malware Mitigation in Cloud Computing Architectures
  • Data Mining and Image Processing-based Automatic Big Multi-Malware Data Classification

Guest Editors

Iman AlMomani

Dr. Iman AlMonami received the bachelor’s degree from United Arab Emirates, in 2000, the master’s degree in computer science from Jordan, in 2002, and the Ph.D. degree in wireless network security from De Montfort University, U.K., in 2007. She is currently an Associate Professor in cybersecurity. She is also the Associate Director of the Research and Initiatives Centre (RIC) and also the Leader of the Security Engineering Laboratory (SEL), Prince Sultan University (PSU), Riyadh, Saudi Arabia. Before Joining Prince Sultan University, she has worked as an Associate Professor and the Head of the Computer Science Department, The University of Jordan, Jordan. Her research interests include wireless networks and security, mainly wireless mobile ad hoc networks (WMANETs), wireless sensor networks (WSNs), multimedia networking (VoIP), and security issues in wireless networks. She is also interested in the area of electronic learning (e-learning) and mobile learning (m-learning). She has several publications in the above areas in a number of reputable international and local journals and conferences. She is also a Senior Member of IEEE WIE. She is on the organizing and technical committees of a number of local and international conferences. She also serves as a reviewer and a member of the editorial board for a number of international journals.

Leandros Maglaras

Prof. Leandros A. Maglaras is a Professor in the School of Computer Science and Informatics of De Montfort University, conducting research in the Cyber Security Centre. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained the B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield. He serves on the Editorial Board of several international peer-reviewed journals such as IEEE Access, Elsevier Array and Wiley Journal on Security & Communication Networks. He is featured in Stanford University's list of the world Top 2% scientists for the year 2019. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 150 papers in scientific magazines and conferences.

Mohamed Amine Ferrag

Dr. Mohamed Amine Ferrag received the Bachelor's degree (June, 2008), Master's degree (June, 2010), Ph.D. degree (June, 2014), HDR degree (April, 2019) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science. Since October 2014, he is a senior lecturer at the Department of Computer Science, Guelma University, Algeria. Since July 2019, he is a Visiting Senior Researcher, NAU-Lincoln Joint Research Center of Intelligent Engineering, Nanjing Agricultural University, China. His research interests include wireless network security, network coding security, and applied cryptography. He is featured in the Stanford University's list of world Top 2% scientists for the year 2019. He has been conducting several research projects with international collaborations on these topics. He has published more than 60 papers in international journals and conferences in the above areas. Some of his research findings are published in top-cited journals, such as the IEEE Communications Surveys & Tutorials, IEEE Internet of Things Journal, IEEE Transactions on Engineering Management, IEEE Access, Journal of Information Security and Applications (Elsevier), Transactions on Emerging Telecommunications Technologies (Wiley), Telecommunication Systems (Springer), International Journal of Communication Systems (Wiley), Sustainable Cities and Society (Elsevier), Security and Communication Networks (Wiley), and Journal of Network and Computer Applications (Elsevier). He has participated in many international conferences worldwide, and has been granted short-term research visitor internships to many renown universities including, De Montfort University, UK and Istanbul Technical University, Turkey. He is currently serving on various editorial positions such as Editorial Board Member in Journals (Indexed SCI & Scopus) such as, IET Networks, International Journal of Internet Technology and Secured Transactions (Inderscience Publishers), EAI Endorsed Transactions on Security and Safety (EAI), International Journal of Web Services Research (IJWSR) (IGI Global), and International Journal on Semantic Web and Information Systems (IJSWIS) (IGI Global).

Nick Ayres

Dr. Nick Ayres received the Bachelor's degree (July, 1996) in Engineering Information Technology, Master's degree (June, 2013) in Cyber Security, Ph.D. degree (March, 2021) in Computer Science from De Montfort University, United Kingdom. He is a lecturer in Cyber Security specializing in incident response, social engineering and cyberterrorism. His current research interests include over the air automotive software updates and the impact of risk compensation. He has authored a number of publications concerning cyberterrorism as well as other topics including susceptibility to phishing utilizing fuzzy logic as well as several publications regarding automotive technology.

Submission Guidelines

Authors are invited to submit original manuscripts, in English.
For details on how to prepare the manuscripts and style files refer to the instruction page for authors instruction page for authors.
This page also includes the latex macro packages and further instructions. Authors should submit their original work that must not be submitted or currently under consideration for publication anywhere.
Submissions of chapters for the book will be done to the Easychair system, using the submissions link:
Any questions about this book, please feel free to contact:

Latest Products Image
Latest Products Image
Latest Products Image