posted by system || 10970 views || tracked by 21 users: [display]

WNI_SI_JCSS 2012 : JCSS, Elsevier, Special Issue on Wireless Networks Intrusion


When N/A
Where N/A
Submission Deadline Nov 30, 2012
Notification Due Apr 30, 2013
Final Version Due May 15, 2013
Categories    wireless   security   intrusion   authentication

Call For Papers

Call for Papers

Journal of Computer and System Sciences, Elsevier
Special Issue on Wireless Networks Intrusion


The security mechanisms for various wired networks are more or less well-defined. Especially when intrusion detection and prevention techniques are considered, wired networks appear to be in a much better status than their wireless counterparts. Indeed, security concerns are, still, a significant impediment to widespread adoption of wireless network technologies. Because of the use of wireless communications technology, structure of the wireless networks, limited resources available on wireless devices, and open nature of wireless communications, employing an effective and efficient intrusion detection and prevention system for detecting and thwarting malicious attacks against wireless communication still remains a great challenge to researchers. On the other side, recent increase in the interest in anywhere, anytime, anybody’s network with the aid of wireless self-organizing networks has made the demand of effective intrusion detection and prevention techniques even more critical. We consider four types of wireless networks under wireless self-organizing networks (SON) category: Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), Wireless Mesh Network (WMN), and Vehicular Ad Hoc Network (VANET). The status quo of these networks lacks standardized mechanisms for intrusion detection and prevention. In particular for WSN, with limited resources of the involved tiny sensor nodes, employing such defensive and/or preventive mechanisms is, indeed, a tough challenge. If the system is distributed, the nodes may not be able to run the system; if centralized and controlled by the base station, the system may not serve the actual purpose of intrusion handling within the actual deployed network. We are interested, in this Special Issue, to put together the latest advancements in these related areas and to get the thoughts of the researchers, practitioners, and users of these technologies. The articles could be from the theory and/or practical perspectives. Extensive review articles on specific topics are most welcome. The articles are expected to touch up on any of the four types of SONs, namely MANET, WSN, WMN, and VANET. The targeted topics for this special issue are (though the list should not be considered exhaustive):

- Intrusion detection schemes
- Intrusion prevention schemes
- Tracing back mobile attackers
- Secure routing with intrusion prevention
- Access control
- Authentication mechanisms
- Resource efficient intrusion detection & prevention
- Anomaly detection
- Specification based detection
- Misuse detection
- Intrusion detection vs Intrusion prevention
- Artificial Intelligence (AI) based techniques
- Game theory based techniques
- Physical intrusion in WSN
- Cross-layer based intrusion detection
- Agent based intrusion surveillance, detection and prevention

Important Dates:

Manuscript due date: November 30, 2012
First round review notification: February 28, 2013
Revised paper due: March 30, 2013
Notification of acceptance/rejection: April 25, 2013
Submission of final manuscript: May 15, 2013

Submission Guidelines and Review Process:

All papers should be submitted via email to the corresponding editor at (with a CC to Please mention in the subject line of the email, “JCSS-SI_WNI”. CC to all editors is also encouraged. Please find the Manuscript preparation guideline here:

Each paper will be reviewed by expert reviewers working on the relevant areas. Each submission must be original, unpublished, and must not be under review elsewhere.

In addition to the regular open submissions, selected accepted and registered papers from the 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012) ( will be invited for inclusion in this special issue after significant revision and extension.

Guest Editors:

Al-Sakib Khan Pathan (Corresponding Editor)
Department of Computer Science, KICT
International Islamic University Malaysia, Malaysia
Email: ,

Zubair Muhammad Fadlullah
Electrical and Computer Engineering,
Graduate School of Information Sciences,
Tohoku University, Japan

Mostafa Fouda
Graduate School of Information Sciences
Tohoku University, Japan
Electrical Engineering Department, Faculty of Engineering
Benha University, Egypt

Hae Young Lee
CPS Research Team
ETRI, South Korea

Best Regards,

Al-Sakib Khan Pathan, Ph.D.
Founding Head, NDC Laboratory, KICT, IIUM

Assistant Professor & FYP Coordinator, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

Personal URL:

Related Resources

IEEE--ICICN--Ei Compendex, Scopus 2020   IEEE--2020 The 8th International Conference on Information, Communication and Networks (ICICN 2020)--Ei Compendex, Scopus
SP 2020   IEEE Symposium on Security and Privacy
AdHoc-Now 2020   The 19th International Conference on Ad Hoc Networks and Wireless
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICWNES 2020   2020 International Conference on Wireless Networks and Embedded Systems (ICWNES 2020)
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
ICPR 2020   International Conference on Pattern Recognition 2020
FGCS-ETDNS 2020   Future Generation Computer Systems SI on Emerging Topics in Defending Networked Systems
ETRIJ 5G&B5G 2020   ETRI Journal Special Issue on 5G & B5G Enabling Edge Computing, Big Data & Deep Learning Technologies
ICCCN 2020   International Conference on Computer Communications and Networks