+ADwAIQ-DOCTYPE HTML PUBLIC +ACI--//W3C//DTD HTML 4.01 Transitional//EN+ACIAPg-
+ADw-HTML+AD4-
+ADw-HEAD+AD4-
+ADw-TITLE+AD4- +AFs-Tccc+AF0- CFP: JCSS SI on Wireless Net. Intrusion (Impact Factor: 1.631)
+ADw-/TITLE+AD4-
+ADw-LINK REL+AD0AIg-Index+ACI- HREF+AD0AIg-index.html+ACI- +AD4-
+ADw-LINK REL+AD0AIg-made+ACI- HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20CFP+ACU-3A+ACU-20JCSS+ACU-20SI+ACU-20on+ACU-20Wireless+ACU-20Net.+ACU-20Intrusion+ACU-20+ACU-28Impact+ACU-20Factor+ACU-3A+ACU-0A+ACU-091.631+ACU-29+ACY-In-Reply-To+AD0AJQ-3CCAEcBs+AF8-KKSDUrHeqypJC-iJ9CzF+ACU-3DZEkvNB6b5fyD8HrcUnosCDg+ACU-40mail.gmail.com+ACU-3E+ACIAPg-
+ADw-META NAME+AD0AIg-robots+ACI- CONTENT+AD0AIg-index,nofollow+ACIAPg-
+ADw-style type+AD0AIg-text/css+ACIAPg-
pre +AHs-
white-space: pre-wrap+ADs- /+ACo- css-2.1, curent FF, Opera, Safari +ACo-/
+AH0-
+ADw-/style+AD4-
+ADw-META http-equiv+AD0AIg-Content-Type+ACI- content+AD0AIg-text/html+ADs- charset+AD0-us-ascii+ACIAPg-
+ADw-LINK REL+AD0AIg-Previous+ACI- HREF+AD0AIg-029475.html+ACIAPg-
+ADw-LINK REL+AD0AIg-Next+ACI- HREF+AD0AIg-029477.html+ACIAPg-
+ADw-/HEAD+AD4-
+ADw-BODY BGCOLOR+AD0AIgAj-ffffff+ACIAPg-
+ADw-H1+AD4AWw-Tccc+AF0- CFP: JCSS SI on Wireless Net. Intrusion (Impact Factor: 1.631)+ADw-/H1+AD4-
+ADw-B+AD4-Sakib Pathan+ADw-/B+AD4-
+ADw-A HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20CFP+ACU-3A+ACU-20JCSS+ACU-20SI+ACU-20on+ACU-20Wireless+ACU-20Net.+ACU-20Intrusion+ACU-20+ACU-28Impact+ACU-20Factor+ACU-3A+ACU-0A+ACU-091.631+ACU-29+ACY-In-Reply-To+AD0AJQ-3CCAEcBs+AF8-KKSDUrHeqypJC-iJ9CzF+ACU-3DZEkvNB6b5fyD8HrcUnosCDg+ACU-40mail.gmail.com+ACU-3E+ACI-
TITLE+AD0AIgBb-Tccc+AF0- CFP: JCSS SI on Wireless Net. Intrusion (Impact Factor: 1.631)+ACIAPg-sakib.pathan
+ADw-/A+AD4APA-BR+AD4-
+ADw-I+AD4-Thu Apr 12 07:22:16 EDT 2012+ADw-/I+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-029475.html+ACIAPgBb-Tccc+AF0- Call For Participation - SUMMER SCHOOL - Cooperation of Robots and Sensor Networks
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-029477.html+ACIAPgBb-Tccc+AF0- +AFs-Extended Deadline: Apr. 14+AF0- VCSC 2012: IEEE SECON Workshop on Vehicular Communications, Sensing and Computing (VCSC)
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-29476+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-29476+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-29476+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-29476+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-HR+AD4-
+ADwAIQ---beginarticle--+AD4-
+ADw-PRE+AD4AWw-Apologies, for multiple copies of the CFP+AF0AKg-
Call for Papers
+ACo-
+ACo-Journal of Computer and System Sciences, Elsevier (Impact Factor: 1.631)
Special Issue on Wireless Networks Intrusion
+ACoAPA-A HREF+AD0AIg-http://www.journals.elsevier.com/journal-of-computer-and-system-sciences/+ACoAIgA+-http://www.journals.elsevier.com/journal-of-computer-and-system-sciences/+ACoAPA-/A+AD4-
+ACo-
+ACo-Overview:
+ACo-
The security mechanisms for various wired networks are more or less
well-defined. Especially when intrusion detection and prevention techniques
are considered, wired networks appear to be in a much better status than
their wireless counterparts. Indeed, security concerns are, still, a
significant impediment to widespread adoption of wireless network
technologies. Because of the use of wireless communications technology,
structure of the wireless networks, limited resources available on wireless
devices, and open nature of wireless communications, employing an effective
and efficient intrusion detection and prevention system for detecting and
thwarting malicious attacks against wireless communication still remains a
great challenge to researchers. On the other side, recent increase in the
interest in anywhere, anytime, anybody?s network with the aid of wireless
self-organizing networks has made the demand of effective intrusion
detection and prevention techniques even more critical. We consider four
types of wireless networks under wireless self-organizing networks (SON)
category: Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN),
Wireless Mesh Network (WMN), and Vehicular Ad Hoc Network (VANET). The
status quo of these networks lacks standardized mechanisms for intrusion
detection and prevention. In particular for WSN, with limited resources of
the involved tiny sensor nodes, employing such defensive and/or preventive
mechanisms is, indeed, a tough challenge. If the system is distributed, the
nodes may not be able to run the system+ADs- if centralized and controlled by
the base station, the system may not serve the actual purpose of intrusion
handling within the actual deployed network. We are interested, in this
Special Issue, to put together the latest advancements in these related
areas and to get the thoughts of the researchers, practitioners, and users
of these technologies. The articles could be from the theory and/or
practical perspectives. Extensive review articles on specific topics are
most welcome. The articles are expected to touch up on any of the four
types of SONs, namely MANET, WSN, WMN, and VANET. The targeted topics for
this special issue are (though the list should not be considered
exhaustive):
- Intrusion detection schemes
- Intrusion prevention schemes
- Tracing back mobile attackers
- Secure routing with intrusion prevention
- Access control
- Authentication mechanisms
- Resource efficient intrusion detection +ACY-amp+ADs- prevention
- Anomaly detection
- Specification based detection
- Misuse detection
- Intrusion detection vs Intrusion prevention
- Artificial Intelligence (AI) based techniques
- Game theory based techniques
- Physical intrusion in WSN
- Cross-layer based intrusion detection
- Agent based intrusion surveillance, detection and prevention
+ACo-Important Dates:
+ACo-
Manuscript due date: November 30, 2012
First round review notification: February 30, 2013
Revised paper due: April 30, 2013
Notification of acceptance/rejection: March 25, 2013
Submission of final manuscript: May 15, 2013
+ACo-Submission Guidelines and Review Process:
+ACo-
All papers should be submitted via email to the corresponding editor at
sakib.pathan at gmail.com (with a CC to sakib at iium.edu.my). Please mention in
the subject line of the email, ?JCSS-SI+AF8-WNI?. CC to all editors is also
encouraged. Please find the Manuscript preparation guideline here:
(
+ADw-A HREF+AD0AIg-http://www.elsevier.com/wps/find/journaldescription.cws+AF8-home/622867/authorinstructions+ACM-20000+ACIAPg-http://www.elsevier.com/wps/find/journaldescription.cws+AF8-home/622867/authorinstructions+ACM-20000+ADw-/A+AD4-).
Each paper will be reviewed by expert reviewers working on the relevant
areas. Each submission must be original, unpublished, and must not be under
review elsewhere.
In addition to the regular open submissions, selected accepted and
registered papers from the 5th International Conference on Internet and
Distributed Computing Systems (IDCS 2012) (
+ADw-A HREF+AD0AIg-http://www.cloudbus.org/cdn/idcs12/+ACIAPg-http://www.cloudbus.org/cdn/idcs12/+ADw-/A+AD4-) will be invited for inclusion in this
special issue after significant revision and extension.
+ACo-Guest Editors:
+ACo-
+ACo-Al-Sakib Khan Pathan (Corresponding Editor)+ACo-
Department of Computer Science, KICT
International Islamic University Malaysia, Malaysia
Email: sakib.pathan at gmail.com , sakib at iium.edu.my
+ACo-Zubair Muhammad Fadlullah
+ACo-Electrical and Computer Engineering,
Graduate School of Information Sciences,
Tohoku University, Japan
Email: zubair at it.ecei.tohoku.ac.jp, zmfadlullah at gmail.com
+ACo-Mostafa Fouda
+ACo-Graduate School of Information Sciences
Tohoku University, Japan
AND
Electrical Engineering Department, Faculty of Engineering
Benha University, Egypt
E-Mail: mfouda at ieee.org
+ACo-Hae Young Lee
+ACo-CPS Research Team
ETRI, South Korea
Email: haelee at etri.re.kr
Best Regards,
Sakib
--
Al-Sakib Khan Pathan, Ph.D.
Founding Head, NDC Laboratory +ACY-lt+ADsAPA-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/ndclab+ACIAPg-http://staff.iium.edu.my/sakib/ndclab+ADw-/A+AD4AJg-gt+ADs-,
KICT, IIUM
Assistant Professor +ACY-amp+ADs- FYP Coordinator, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +600-61964000 Ext. 5653, Cell: +60163910754-
E-Mails: spathan at ieee.org, sakib at iium.edu.my
Personal URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/+ACIAPg-http://staff.iium.edu.my/sakib/+ADw-/A+AD4-
NDC Lab URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/ndclab/+ACIAPg-http://staff.iium.edu.my/sakib/ndclab/+ADw-/A+AD4-
+ADw-/PRE+AD4-
+ADwAIQ---endarticle--+AD4-
+ADw-HR+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADwAIQ---threads--+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-029475.html+ACIAPgBb-Tccc+AF0- Call For Participation - SUMMER SCHOOL - Cooperation of Robots and Sensor Networks
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-029477.html+ACIAPgBb-Tccc+AF0- +AFs-Extended Deadline: Apr. 14+AF0- VCSC 2012: IEEE SECON Workshop on Vehicular Communications, Sensing and Computing (VCSC)
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-29476+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-29476+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-29476+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-29476+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-hr+AD4-
+ADw-a href+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-More information about the TCCC
mailing list+ADw-/a+AD4APA-br+AD4-
+ADw-/body+AD4APA-/html+AD4-