posted by user: mengw || 4820 views || tracked by 11 users: [display]

Protecting Mobile Networks and Devices 2015 : Call for Book Chapter: Protecting Mobile Networks and Devices: Challenges and Solutions (CRC Press-Taylor & Francis)

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline Aug 30, 2015
Categories    mobile networks   mobile devices   security   challenges and solutions
 

Call For Papers

Book Title: Protecting Mobile Networks and Devices: Challenges and Solutions
To be published by CRC Press - Taylor & Francis

Introduction:
Nowadays, mobile networks and devices are developing at a rapid pace. For example, mobile phone shipments were expected to reach 1.9 billion units in 2014; a 3.1% increase from 2013. It is predicted that there will be more than 4 billion app users worldwide in 2017. With the rapid growth of mobile users, how to protect mobile networks against various attacks has become a big question. For years, security experts have predicted the rise of mobile attacks and malware. Therefore, the need for secure solutions in the mobile environment is increasing.

Objective of the book:
Mobile networks and related devices (e.g., phones or tablets) are an increasingly significant target for various attacks. Thus, the aim of this book is to gather and analyze the latest attacks, solutions and trends relating to mobile security in both academia and industry. Its scope includes mobile networks, mobile phone security, and wireless security.

Recommended Topics
This book welcomes chapters on a wide range of issues related to mobile networks and devices, including all aspects of attacks and solutions. Indicative topics include, but are not limited to, the following:

- Intrusion detection and prevention schemes for mobile networks
- Tracing back mobile attackers
- Secure routing and access control
- Mobile authentication mechanisms
- Security testing of new or existing usability features,
- Agent based intrusion surveillance
- Wireless Access Technologies
- Multimedia security issues for tackling intruders

We welcome both surveys and technical chapters presenting novel analytical research, simulations, practical results and case studies.

Chapter Proposals/Full Chapters submission
Chapter proposals and full chapters can be submitted using email attachments to editors via email (mobilenetwork.chapter@gmail.com) with the email subject of "Chapters for Protecting Mobile Networks and Devices: Challenges and Solutions". Authors of accepted proposals will be notified by around May 30, 2015, but final acceptance will still depend upon a review of the resulting chapter.

Authors should send the chapters in single column format (single spaced, 10 point Times Roman font, 8.5 x 11-inch page size).
-The maximum number of pages for the proposal is 2.
-The full chapter submission can have about 16 to 25 pages, but more are allowed.

Important Dates:

Full Chapter Submission: August 30, 2015
Notification: October 10, 2015
Final Chapter Submission: October 30, 2015

Editor Information:
Dr Weizhi Meng
Infocomm Security Department
Institute for Infocomm Research, Singapore

Dr Xiapu Luo
Department of Computing
The Hong Kong Polytechnic University, Hong Kong

Dr Jianying Zhou
Infocomm Security Department
Institute for Infocomm Research, Singapore

Prof Steven Furnell
School of Computing and Mathematics
Plymouth University, UK

Related Resources

MobileHCI 2017   The 19th International Conference on Human Computer Interaction with Mobile Devices and Services
ACISP 2017   Australasian Conference on Information Security and Privacy
ICANN 2017   International Conference on Artificial Neural Networks 2017
ICMWT 2017   4th iCatse Conference on Mobile and Wireless Technology
AKM 2017   Call for Book Chapters: Analytics and Knowledge Management (Taylor & Francis Group)
USENIX Security 2017   USENIX Security '17
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
AEIJ 2017   Advanced Energy: An International Journal
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications