Special Issue on Recent Advances in Network Security Attacks and Defences
International Journal of Internet Protocol Technology (IJIPT)
(Indexed by ACM, Scopus, and others)
Note: IJIPT is applying for inclusion in Thomson Scientific SCI-E index.
Inclusion will be finalized before the end of 2009.
http://www.inderscience.com/browse/callpaper.php?callID=1131
Over the past few years, network security attacks have become more
easy-to-use, stealth, sophisticated, and powerful with techniques to bypass,
subvert and even target today's security defences such as firewalls,
intrusion detection/prevention systems, and antivirus software. A plethora
of research has been devoted into designing and devising more effective,
intelligent, adaptive and active defence systems and mechanisms. This
special issue strives to foster state-of-the-art research pertaining to
recent advances in the area of security attacks and defences related to
computer networks. The issue focuses on bringing forth recent and novel
research work geared towards identifying and detecting today's security
attacks, and designing best defences and countermeasures to achieve more
secure networks, protocols, systems, and applications.
Subject Coverage
------------------
Topics of interest include but are not limited to:
- Distributed attack systems and mechanisms
- Botnet and Rootkit attacks and defences
- Modern web attacks
- Analysis of new attack vectors and attack surfaces
- Firewalls and intrusion detection/prevention systems
- Intelligent defence systems
- Active and adaptive defence systems
- Novel and emerging secure architecture
- Bio-inspired security defences
- Implementation, deployment and management of security systems
- Tradeoffs between security and system performance
- Threat modelling and secure software systems
Important Dates
-----------------
Full Manuscript Due: 1 June, 2009
Acceptance Notification: 30 September, 2009
Final Manuscript Due: 30 November, 2009
Tentative Publication Date: Early 2010
Guest Editors
--------------
Khaled Salah, King Fahd University of Petroleum & Minerals, Saudi Arabia
Mohammed Sqalli, King Fahd University of Petroleum & Minerals, Saudi Arabia
Ehab El-Shaer, DePaul University, USA
Mohamed Gouda, The University of Texas at Austin, USA
Manuscript Submissions
-------------------------
Submitted papers should not have been previously published nor be currently
under consideration for publication elsewhere.
All papers are refereed through a peer review process. A guide for authors,
sample copies and other relevant information for submitting papers are
available on the Author Guidelines page at:
http://www.inderscience.com/guidelines
Editors and Notes
-------------------
You may send one copy in the form of a PDF file attached to an e-mail
(details in Author Guidelines) to the following:
Dr. Khaled Salah
Department of Information and Computer Science
King Fahd University of Petroleum and Minerals
Saudi Arabia
E-mail: salah@kfupm.edu.sa
With a copy to:
Editorial Office
E-mail: editorial@inderscience.com
Please include in your submission the title of the Special Issue, the title
of the Journal and the name of the Guest Editor.
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment