+ADwAIQ-DOCTYPE HTML PUBLIC +ACI--//W3C//DTD HTML 4.01 Transitional//EN+ACIAPg-
+ADw-HTML+AD4-
+ADw-HEAD+AD4-
+ADw-TITLE+AD4- +AFs-Tccc+AF0- Full Chapter Submission Deadline: April 05, 2013, CRC Book - The State of the Art in Intrusion Prevention and Detection
+ADw-/TITLE+AD4-
+ADw-LINK REL+AD0AIg-Index+ACI- HREF+AD0AIg-index.html+ACI- +AD4-
+ADw-LINK REL+AD0AIg-made+ACI- HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Full+ACU-20Chapter+ACU-20Submission+ACU-20Deadline+ACU-3A+ACU-20April+ACU-2005+ACU-2C+ACU-202013+ACU-2C+ACU-0D+ACU-0A+ACU-20CRC+ACU-20Book+ACU-20-+ACU-20The+ACU-20State+ACU-20of+ACU-20the+ACU-20Art+ACU-20in+ACU-20Intrusion+ACU-20Prevention+ACU-20and+ACU-20Detection+ACY-In-Reply-To+AD0AJQ-3Cmailbox-6856-1375789688-284906+ACU-40CPS-PE406-30342.central.cmich.local+ACU-3E+ACIAPg-
+ADw-META NAME+AD0AIg-robots+ACI- CONTENT+AD0AIg-index,nofollow+ACIAPg-
+ADw-style type+AD0AIg-text/css+ACIAPg-
pre +AHs-
white-space: pre-wrap+ADs- /+ACo- css-2.1, curent FF, Opera, Safari +ACo-/
+AH0-
+ADw-/style+AD4-
+ADw-META http-equiv+AD0AIg-Content-Type+ACI- content+AD0AIg-text/html+ADs- charset+AD0-us-ascii+ACIAPg-
+ADw-LINK REL+AD0AIg-Previous+ACI- HREF+AD0AIg-005747.html+ACIAPg-
+ADw-LINK REL+AD0AIg-Next+ACI- HREF+AD0AIg-005749.html+ACIAPg-
+ADw-/HEAD+AD4-
+ADw-BODY BGCOLOR+AD0AIgAj-ffffff+ACIAPg-
+ADw-H1+AD4AWw-Tccc+AF0- Full Chapter Submission Deadline: April 05, 2013, CRC Book - The State of the Art in Intrusion Prevention and Detection+ADw-/H1+AD4-
+ADw-B+AD4-Al-Sakib Khan Pathan+ADw-/B+AD4-
+ADw-A HREF+AD0AIg-mailto:tccc+ACU-40?Subject+AD0-Re+ACU-3A+ACU-20+ACU-5BTccc+ACU-5D+ACU-20Full+ACU-20Chapter+ACU-20Submission+ACU-20Deadline+ACU-3A+ACU-20April+ACU-2005+ACU-2C+ACU-202013+ACU-2C+ACU-0D+ACU-0A+ACU-20CRC+ACU-20Book+ACU-20-+ACU-20The+ACU-20State+ACU-20of+ACU-20the+ACU-20Art+ACU-20in+ACU-20Intrusion+ACU-20Prevention+ACU-20and+ACU-20Detection+ACY-In-Reply-To+AD0AJQ-3Cmailbox-6856-1375789688-284906+ACU-40CPS-PE406-30342.central.cmich.local+ACU-3E+ACI-
TITLE+AD0AIgBb-Tccc+AF0- Full Chapter Submission Deadline: April 05, 2013, CRC Book - The State of the Art in Intrusion Prevention and Detection+ACIAPg-sakib.pathanatgmail.com
+ADw-/A+AD4APA-BR+AD4-
+ADw-I+AD4-Tue Mar 26 11:08:05 EDT 2013+ADw-/I+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-005747.html+ACIAPgBb-Tccc+AF0- Call for Papers : Workshop on Cloud Computing Issues and Trends
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-005749.html+ACIAPgBb-Tccc+AF0- MobileHealth 2013 - Deadline Extended to April 08, 2013
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-5748+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-5748+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-5748+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-5748+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-HR+AD4-
+ADwAIQ---beginarticle--+AD4-
+ADw-PRE+AD4-
+AFs-Apologies, if you receive multiple copies of the call+AF0-
Dear Colleagues,
Full chapter submission deadline for the CRC Book: +ACo-The State of the Art in
Intrusion Prevention and Detection+ACo- is April 05, 2013 (strict deadline).
Direct submission (without having a previously accepted proposal) will be
open for those who might be interested. Please find below the CFC for
submission guidelines and important dates. Thank you.
Best Regards,
Sakib
Editor, The State of the Art in Intrusion Prevention and Detection,
to be published by CRC Press, USA
------------------------------
-
BOOK TITLE: +ACo-The State of the Art in Intrusion Prevention and Detection+ACo-
+ACo-To be published by CRC Press, USA+ACo-
URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/CRC+AF8-Intrusion/crcintrusion.html+ACIAPg-http://staff.iium.edu.my/sakib/CRC+AF8-Intrusion/crcintrusion.html+ADw-/A+AD4-
+ACo-
Overview+ACo-
Most of the security threats in various communications networks and systems
are posed by the illegitimate entities that enter or intrude within
thenetwork perimeter, which could commonly be termed as +ACY-quot+ADs-intruders+ACY-quot+ADs-.
Sometimes
a legitimate entity in a system could also be compromised in some way so
that an attacker-intended task could be performed for breaching security of
the system. To tackle intrusion of various kinds, we commonly hear about
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS), or
a combination of both called, IDPS (Intrusion Detection and PreventionSystem).
The main task of an IDS is to defend a computer system or computer network
by detecting an attack and possibly repealing it. Successful detection
ofhostile attacks depends on
the number and types of appropriate actions. On the other hand, Intrusion
prevention requires a well-selected combination of baiting and trapping
aimed at the investigations of threats. Diverting the intruders attention
from protected resources is another task. Both the real system and a
possible trap system are constantly monitored. Various tasks and
functionalities can be thought of under intrusion related topics in
computer, communications, or networking fields:
- regular checking the data in computers and systems+ADs-
- monitoring and analyzing network traffic+ADs-
- analyzing network configuration and vulnerabilities+ADs-
- assessing network and data integrity+ADs-
- ability to recognize patterns typical to attacks+ADs-
- tracking the network policy violations+ADs-
- analysis of abnormal activities+ADs-
- outside influence and its impact on a systems security, and so on.
Recommended topics include, but are not limited to, the following:
- Intrusion detection schemes
- Intrusion prevention schemes
- Tracing back mobile attackers
- Secure routing with intrusion prevention
- Access control
- Authentication mechanisms
- Resource efficient intrusion detection +ACY-amp+ADs- prevention
- Anomaly detection
- Specification based detection
- Misuse detection
- Intrusion detection vs Intrusion prevention
- Artificial Intelligence (AI) based intrusion techniques
- Game theory based intrusion detection techniques
- Physical intrusion in wired and wireless networks
- Cross-layer based intrusion detection
- Agent based intrusion surveillance, detection and prevention
- Multimedia security issues for tackling intruders
A tentative structure of the book is:
PART 1: Intrusion in Various Wired Networks
PART 2: Intrusion in Various Wireless Networks
PART 3: Intrusion in Next-Generation +ACY-amp+ADs- Converged Networks
PART 4: Intrusion in Social Networks
+ACo-Submission Guidelines+ACo-
Manuscripts from all spheres of networking, computing, and communications
related to intrusion are welcome. Each manuscript must be written in a
tutorial style with minimum number of mathematical equations or notations
(depends on the subject topic and specific focus). Each manuscript should
be within 9000 to 12000 words including references. The authors should
submit an initial proposal to the editor at +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-sakib.pat... at gmail.com+ADw-/A+AD4-
with theword +ACY-quot+ADs-CRC+AF8-Intrusion+ACY-quot+ADs- in
the email subject.
Please strictly follow the deadlines mentioned below.
Manuscripts submitted for the book must be original, must not be previously
published or currently under review anywhere. Please follow A4 page format,
single column with 11 point Times New Roman font with 1.5 line spacing
while submitting your manuscript as MS-Office (i.e., doc or docx) document.
Use the number referencing style as usually used for regular research
papers, NOT the APA style. That means, mention the reference numbers within
the texts and in the references section, mention all the references with
sequential numbers+ADs- +AFs-1+AF0-, +AFs-2+AF0-, +AFs-3+AF0- ...
A proposal for each chapter is needed as soon as possible before submitting
the full chapter. The abstract/proposal could be within 500 words.
+ACo-Target Audience+ACo-
The target audience of this book are the graduate students, university
teachers, professionals, and researchers working in the fields of intrusion
detection, prevention, or tackling. Moreover, the book is expected to
include some chapters written for the general readers so that they could be
able to easily grasp some of the concepts in this area.
+ACo-Important Dates+ACo-
Full Manuscript Due: April 05, 2013
Acceptance/Revision Notification: May 05, 2013
Final/Revised Chapter Submission June 05, 2013
Publication Time: 2nd half of 2013 (tentative)
Inquiries and submissions can be forwarded electronically (Word document)
or by postal mail to:
+ACo-
EDITOR'S CONTACT DETAILS+ACo-
Al-Sakib Khan Pathan, Ph.D.
Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +600-61964000 Ext. 5653, Cell: +60163910754-
E-Mails: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-sakib.pat... at gmail.com+ADw-/A+AD4-, +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-sa... at iium.edu.my+ADw-/A+AD4-
URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/+ACIAPg-http://staff.iium.edu.my/sakib/+ADw-/A+AD4-
--
Al-Sakib Khan Pathan, Ph.D.
Founding Head, NDC
Laboratory+ACY-lt+ADsAPA-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/ndclab/index.html+ACIAPg-http://staff.iium.edu.my/sakib/ndclab/index.html+ADw-/A+AD4AJg-gt+ADs-,
KICT, IIUM
Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +600-61964000 Ext. 5653, Cell: +60163910754-
E-Mails: +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-spat... at ieee.org+ADw-/A+AD4-, +ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-sa... at iium.edu.my+ADw-/A+AD4-
Personal URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/+ACIAPg-http://staff.iium.edu.my/sakib/+ADw-/A+AD4-
NDC Lab URL: +ADw-A HREF+AD0AIg-http://staff.iium.edu.my/sakib/ndclab/+ACIAPg-http://staff.iium.edu.my/sakib/ndclab/+ADw-/A+AD4-
+AF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXwBfAF8AXw-
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
+ADw-A HREF+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-Tccc at lists.cs.columbia.edu+ADw-/A+AD4-
+ADw-A HREF+AD0AIg-https://lists.cs.columbia.edu/cucslists/listinfo/tccc+ACIAPg-https://lists.cs.columbia.edu/cucslists/listinfo/tccc+ADw-/A+AD4-
+ADw-/PRE+AD4-
+ADwAIQ---endarticle--+AD4-
+ADw-HR+AD4-
+ADw-P+AD4APA-UL+AD4-
+ADwAIQ---threads--+AD4-
+ADw-LI+AD4-Previous message: +ADw-A HREF+AD0AIg-005747.html+ACIAPgBb-Tccc+AF0- Call for Papers : Workshop on Cloud Computing Issues and Trends
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4-Next message: +ADw-A HREF+AD0AIg-005749.html+ACIAPgBb-Tccc+AF0- MobileHealth 2013 - Deadline Extended to April 08, 2013
+ADw-/A+AD4APA-/li+AD4-
+ADw-LI+AD4- +ADw-B+AD4-Messages sorted by:+ADw-/B+AD4-
+ADw-a href+AD0AIg-date.html+ACM-5748+ACIAPgBb- date +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-thread.html+ACM-5748+ACIAPgBb- thread +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-subject.html+ACM-5748+ACIAPgBb- subject +AF0APA-/a+AD4-
+ADw-a href+AD0AIg-author.html+ACM-5748+ACIAPgBb- author +AF0APA-/a+AD4-
+ADw-/LI+AD4-
+ADw-/UL+AD4-
+ADw-hr+AD4-
+ADw-a href+AD0AIg-http://committees.comsoc.org/tccc/+ACIAPg-More information about the TCCC
mailing list+ADw-/a+AD4APA-br+AD4-
+ADw-/body+AD4APA-/html+AD4-