Friday 23 November 2012

Re: [pakgrid] Dear Friends Assalamualakum

 

Following CFP may give you some good idea for your research:

Call for Papers
*
*Journal of Computer and System Sciences, Elsevier (Impact Factor: 1.157)
Special Issue on Wireless Networks Intrusion
*http://www.journals.elsevier.com/journal-of-computer-and-system-sciences/*
*
*Overview:
*
The security mechanisms for various wired networks are more or less
well-defined. Especially when intrusion detection and prevention techniques
are considered, wired networks appear to be in a much better status than
their wireless counterparts. Indeed, security concerns are, still, a
significant impediment to widespread adoption of wireless
network technologies. Because of the use of
wireless communications technology, structure of the wireless networks,
limited resources available on wireless devices, and open nature of
wireless communications, employing an effective and efficient
intrusion detection and prevention system for detecting and thwarting
malicious attacks against wireless communication still remains a great
challenge to researchers. On the other side, recent increase in the
interest in anywhere, anytime, anybody's network with the aid of
wireless self-organizing
networks has made the demand of effective intrusion detection and
prevention techniques even more critical. We consider four types of wireless
networks under wireless self-organizing networks (SON) category: Mobile Ad
Hoc Network (MANET), Wireless Sensor Network (WSN), Wireless Mesh
Network(WMN), and Vehicular Ad Hoc
Network (VANET). The status quo of these networks lacks standardized
mechanisms for intrusion detection and prevention. In particular for WSN,
with limited resources of the involved tiny sensor nodes, employing such
defensive and/or preventive mechanisms is, indeed, a tough challenge. If
the system is distributed, the nodes may not be able to run the system; if
centralized and controlled by the base station, the system may not serve
the actual purpose of intrusion handling within the actual deployed network.
We are interested, in this Special Issue, to put together the latest
advancements in these related areas and to get the thoughts of the
researchers, practitioners, and users of these technologies. The articles
could be from the theory and/or practical perspectives. Extensive review
articles on specific topics are most welcome. The articles are expected to
touch up on any of the four types of SONs, namely MANET, WSN, WMN, and
VANET. The targeted topics for this special issue are (though the list
should not be considered exhaustive):

- Intrusion detection schemes
- Intrusion prevention schemes
- Tracing back mobile attackers
- Secure routing with intrusion prevention
- Access control
- Authentication mechanisms
- Resource efficient intrusion detection & prevention
- Anomaly detection
- Specification based detection
- Misuse detection
- Intrusion detection vs Intrusion prevention
- Artificial Intelligence (AI) based techniques
- Game theory based techniques
- Physical intrusion in WSN
- Cross-layer based intrusion detection
- Agent based intrusion surveillance, detection and prevention



From: PRINCE OF DREAMS <princebilal25@yahoo.com>
To: pakgrid@yahoogroups.com
Sent: Friday, November 16, 2012 7:02 PM
Subject: [pakgrid] Dear Friends Assalamualakum

 
I am bilal Shah recently joined Dalian uni of technology China on scholarship for my PhD in communication and information system.my background is computer science and networking.i want to select a research area related to computer networks that should have Hot topics and may be beneficial for me in future research.i want comments and suggestions from all of you so that i should start my research efficiently.thanks

Syed Bilal Hussain Shah (BI LA ER)
PhD schloar at School of Information and Communication Engineering
Dalian University of Technology,
Dalian 116024, P.R.China
Email: Princebilal25@yahoo.com



__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (9)
Recent Activity:
.

__,_._,___

No comments:

Post a Comment