eScripts is currently undergoing an upgrade and heavy maintenance that may cause instability to the service and unsolicited emails going out to users in the upcoming few days. We apologize for any inconvenience that his may cause you and we appreciate your understanding as we continue to improve your experience.
If you encounter significant issues with eScripts, please let us know at

[CLOSED] Security Incidents & Response Against Cyber Attacks

Editorial Board
Lead Guest Editors:
  • Dr. Akashdeep Bhardwaj (School of Computer Science, University of Petroleum and Energy Studies,Dehradun)+ BioCyber Security Operations Head and Researcher
Guest Editors:
  • Varun Sapra (UPES Dehradun)
  • Sam Goundar (The University of the South Pacific, Suva, Fiji)+ BioDr. Sam Goundar is an International Academic having taught at twelve different universities in ten different countries. He is the Editor-in-Chief of the International Journal of Blockchains and Cryptocurrencies (IJBC) - Inderscience Publishers, Editor-in-Chief of the International Journal of Fog Computing (IJFC) - IGI Publishers, Section Editor of the Journal of Education and Information Technologies (EAIT) - Springer and Editor-in-Chief (Emeritus) of the International Journal of Cloud Applications and Computing (IJCAC) - IGI Publishers. He is also on the Editorial Review Board of more than 20 high impact factor journals. He is currently working (writing/editing) on eight book projects. Three has been published and the other three are expected to be published between July 2020 to September 2020: 1. Architecture and Security Issues in Fog Computing Applications. Published by IGI Global, Idea Publishing Group, Pennsylvania, USA. Click here for the book … 2. E-Services (e-Commerce, e-Business, e-Government, and e-Learning). Published by Intech Open (Open Access Publishers), London, United Kingdom. Click here for the book … 3. Impact of Digital Transformation on Security Policies and Standards. Published by IGI Global, Idea Publishing Group, Pennsylvania, USA. Click here for the book … 4. Blockchain Technologies, Applications and Cryptocurrencies: Current Practices and Future Trends. In Publication by World Scientific Publishing, Singapore. Click here for the link to the book 5. Enterprise Systems for Management: Applications and Practice to be published by Information Age Publishing, North Carolina, USA. Click here for the link to the publisher … 6. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory to be published by IGI Global, Idea Publishing Group, Pennsylvania, USA. Click here for the link to the book … 7. Applications of Big Data in Large- and Small-Scale Systems to be published by IGI Global, Idea Publishing Group, Pennsylvania, USA. Click here for the link to the book …
Aims & Scope
This book provides use case scenarios of Machine Learning, Artificial Intelligence and real-time new age domain to supplement Cyber Security Operations and proactively predict attacks can preempt Cyber incidents. In order to prepare and respond, Cybersecurity Incident planning is highly essential. This starts from a draft response plan, assigning responsibilities, use of external experts, equip organization teams to address incidents, prepare communication strategy and cyber insurance. Incident plan involves classification and methods to detect the cybersecurity incidents and includes Incident Response Team, Situational Awareness, Containing and Eradicating incidents right until Cleanup and Recovery.
  • New Age Cybersecurity Attacks
  • Malware & Phishing
  • Cyber Physical Attacks
  • Cyber Safety Techniques
  • Network Security
  • Industrial Security
  • Blockchain Security
  • Incident Response
  • Use Cases
Cybersecurity Attacks, Phishing, Incident Response, Real Time Case Studies, Cyber physical systems, Cyber Safety Technologies, End User Systems, Handheld Security, Network Security, Datacenter & IT Infrastructure security, Database Security, Cloud Security, Securing IoT, Blockchain, Applications, Threat Surface Area and Landscape, Use of Big Data, Machine Learning, Artificial Intelligence to pre-empt Cyber Attacks, OSINT, Threat Hunting from Deep Web and Dark Web, Cyber Kill Chain, Monitoring, espionage and surveillance of unsecure Internet sources, Malware

Manuscript submission deadline:
Notification of acceptance:
Submission of final revised paper:
Publication of special issue (tentative):

EAI/Springer ICC Series
Submission Closed