lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201303211904.r2LJ42Cd012651@smtp.upv.es>
Date: Thu, 21 Mar 2013 20:04:03 +0100
From: Jaime Lloret Mauri<jlloret@...m.upv.es>
To: full-disclosure@...ts.grok.org.uk
CC: 
Subject: CFP (Extended Deadline) : S.I. on Intrusion
	Detection and Security Mechanisms for WSNs


Special Issue on Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

International Journal of Distributed Sensor Networks
ISI Thomson Impact Factor (2011): 0.203

Call for Papers

Wireless sensor networks are gaining significant interest from academia and industry. Wireless sensor networks are multihop, self-organizing, self-healing, and distributed in nature. These characteristics also increase vulnerability and expose sensor networks to various kinds of security attacks. Advance security mechanisms and intrusion detection systems (IDSs) can play an important role in detecting and preventing security attacks.

This special issue aims to gather recent advances in the area of security aspect of wireless sensor networks. It welcomes research and review articles that focus on the challenges and the state-of-the-art solutions. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the topic of this special issue. Potential topics include, but are not limited to:

� Intrusion detection systems
� Secure neighbor discovery, localization, and mobility
� Security architectures, deployments, and solutions
� Denial of service attacks and countermeasures
� Intrusion prevention techniques
� Adaptive defense systems
� Trust establishment and privacy
� Confidentiality, integrity, and availability assurance
� Authentication and access control
� Secure routing protocols
� Cryptography, encryption algorithms, and key management schemes
� Experimental validation and experiences with testbed and/or deployment

Before submission authors should carefully read over the journal's Author Guidelines, which are located at http://www.hindawi.com/journals/ijdsn/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/author/submit/journals/ijdsn/ids/ according to the following timetable:

Manuscript Due	Friday, 1 April 2013 (Extended)
First Round of Reviews	Friday, 24 May 2013
Publication Date	Friday, 19 July 2013

Lead Guest Editor

S. Khan, IIT, Kohat University of Science and Technology (KUST), Kohat, Pakistan

Guest Editors

Jaime Lloret, Integrated Management Coastal Research Institute, Polytechnic University of Valencia, Valencia, Spain
Jonathan Loo, School of Engineering and Information Sciences, Middlesex University, London, UK


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ