<div dir="ltr"><div style="padding:20px 0px 0px;font-family:Roboto,RobotoDraft,Helvetica,Arial,sans-serif"><span style="font-family:arial,sans-serif;font-size:large;text-align:justify">Dear Sir/Madam, </span></div><div style="font-family:Roboto,RobotoDraft,Helvetica,Arial,sans-serif;font-size:medium"><div id="gmail-m_-5959444094748873172gmail-m_1903144842766666528gmail-m_-679552860805800245yiv4184424091gmail-m_5586656613038040876gmail-m_8929703746322084678gmail-:1l0" style="direction:ltr;margin:8px 0px 0px;padding:0px"><div id="gmail-m_-5959444094748873172gmail-m_1903144842766666528gmail-m_-679552860805800245yiv4184424091gmail-m_5586656613038040876gmail-m_8929703746322084678gmail-:1kz" style="overflow:hidden;font-stretch:normal;font-size:small;line-height:1.5;font-family:Arial,Helvetica,sans-serif"><div dir="ltr"><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt;text-align:justify;line-height:16.25pt"><span style="font-family:arial,sans-serif;font-size:large">This is a special call for invited chapters from</span><span style="font-family:arial,sans-serif;font-size:large"> all researchers working in </span><span style="font-family:arial,sans-serif;font-size:large"> AI, Machine, and Deep Learning in Cyber Forensics</span><span style="font-family:arial,sans-serif;font-size:large">.</span><br></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4">The reviewed and accepted chapters will be published in IGI Global book titled, <b>Confluence of AI, Machine, and Deep Learning in Cyber Forensics.</b></font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4"><b><br></b></font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4">Follow this link to explore about the edited book : <a rel="nofollow" href="https://www.igi-global.com/publish/call-for-papers/call-details/4496" target="_blank">https://www.igi-global.com/publish/call-for-papers/call-details/4496</a></font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt;line-height:normal"><font face="arial, sans-serif" size="4"> </font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4">Invited chapters for this book, but limited to:<br></font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4"><br></font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Analysis of Forensic Knowledge</font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Evidence Collection, Extraction and Reporting </font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Storage and Transmit Information </font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Volume of Digital Forensic Data </font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Forensic Tools </font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Impediments in Mobile Device Forensic </font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Deep Learning-based Forensics and Anti-Forensics </font></p><p style="color:rgb(38,40,42);text-align:justify;margin:0cm 0cm 0.0001pt"><font face="arial, sans-serif" size="4"><span lang="EN-US"></span></font></p><p style="color:rgb(38,40,42);margin:0cm 0cm 0.0001pt 36pt;line-height:normal"><font face="arial, sans-serif" size="4">·<span style="font-stretch:normal;line-height:normal"> </span>Applications of Machine Learning in Cyber Forensics</font></p><p style="color:rgb(38,40,42);margin:15.2pt 0cm 3.55pt;line-height:normal"><font face="arial, sans-serif"><font size="4">Submit your abstract of 1000-2000 words on or before <b>December 21, 2019,</b> clearly explaining the mission and concerns of his or her proposed chapter by. following the link : <a rel="nofollow" href="https://www.igi-global.com/publish/call-for-papers/submit/4496" target="_blank" style="color:blue">https://www.igi-global.com/publish/call-for-papers/submit/4496</a> </font></font></p><p style="color:rgb(38,40,42);margin:15.2pt 0cm 3.55pt;line-height:normal"><font face="arial, sans-serif"><font size="4"><span style="color:rgb(51,51,51)">Authors will be notified by </span><b style="color:rgb(51,51,51)">January 4, 2020</b><span style="color:rgb(51,51,51)"> about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by </span><b style="color:rgb(51,51,51)">March 4, 2020</b><span style="color:rgb(51,51,51)">, and all interested authors must consult the guidelines for manuscript submissions at </span><a rel="nofollow" href="http://www.igi-global.com/publish/contributor-resources/before-you-write/" target="_blank" style="color:rgb(51,102,204);text-decoration-line:none">http://www.igi-global.com/publish/contributor-resources/before-you-write/</a><span style="color:rgb(51,51,51)"> prior to submission.</span></font></font></p><p style="color:rgb(38,40,42);margin:15.2pt 0cm 3.55pt;line-height:normal"><font face="arial, sans-serif"><font size="4"><span style="color:rgb(51,51,51)"> All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. </span></font> </font></p><br class="gmail-Apple-interchange-newline"></div></div></div></div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr">Kind regards,<br><br>Dr. A. Chamundeswari,<br></div><div>Professor,<br></div><div>Department of Computer Science and Engineering,<br></div><div>SSN College of Engineering,<br></div><div>Rajiv Gandhi Salai(OMR),<br></div><div>Kalavakkam, TamilNadu,<br></div><div>Pin-603110.<br></div><div> </div></div></div></div></div></div></div></div>
<br>
<font size="1">::DISCLAIMER::
<br></font><pre><font size="1">------------------------------<WBR>------------------------------<WBR>---------
The contents of this e-mail and any attachment(s) are confidential and
intended for the named recipient(s) only. Views or opinions, if any,
presented in this email are solely those of the author and may not
necessarily reflect the views or opinions of SSN Institutions (SSN) or its
affiliates. Any form of reproduction, dissemination, copying, disclosure,
modification, distribution and / or publication of this message without the
prior written consent of authorized representative of SSN is strictly
prohibited. If you have received this email in error please delete it and
notify the sender immediately.
------------------------------<WBR>------------------------------<WBR>---------<br>Header of this mail should have a valid DKIM signature for the domain <a href="http://www.ssn.edu.in/" target="_blank">ssn.edu.in</a><br></font></pre>