CALL FOR CHAPTERS CALL FOR CHAPTER PROPOSALS

advertisement
CALL FOR CHAPTERS
CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: September 30, 2013
Threat Detection and Countermeasures in Network Security
A book edited by Prof. Dr. Alaa Hussein Al-Hamami (Amman Arab University, Jordan)
and Dr. Ghossoon M. Waleed Al-Saadoon (Applied Sciences University, kingdom of Bahrain)
To be published by IGI Global: http://www.igi-global.com/publish/call-for-papers/call-details/1059
For release in the Advances in Information Security, Privacy, & Ethics (AISPE) Book Series.
Introduction
Nowadays, the field of security is facing more challenges than ever due to the fact that “Perfect Security is not exist” and
to the innovation in e-business applications, which need more security and trust in doing business. There is a facto also
concerning the new technology because “New technology brings new threats”. Security will continue its mission of
promoting high level research efforts and novel applications through specialized research issues. Security constitutes many
important topics for novel and future oriented research.
Prospective authors are invited to submit manuscripts for possible publication in Threat Detection and Countermeasures
in Network Security. This book will publish original material concerned with all aspects of security on network threats
detection and prevention, security countermeasures and algorithms, modeling, analysis, management, implementation,
theories, and performance evaluation. The primary mission of the book is to be influential in the improvement and
development of the theory and practice of countermeasures in network security and its theories, algorithms, applications
and modeling, appealing to academics, researchers, and professionals. In the information technology age, and with
tremendous advancement in computer and communication technologies, network security has become an integral part of
many applications and organizations. It is our further aim to provide enough examples to educate organizations on how they
can benefit from network security, evaluate the performance, and manage these valuable resources.
Computer security theories are widely‐used in investigating the performance of existing and proposed computer
networks security, protocols, algorithms, models, applications, etc. The application of network security can potentially
improve the quality and effectiveness of network design and modeling. It is generally unfeasible to implement a network
security design, protocol, algorithm, or model before valid tests are performed to evaluate their performance. It is clear that
testing and evaluating such implementations with real hardware is quite complex, in terms of the manpower, time, and other
resources. The preferred alternative is to model these algorithms in a detailed simulator and then perform various scenarios
to measure their performance for various patterns of realistic computer networks environments (e.g., connection media,
node densities, node mobility, transmission range, size of traffic, etc…). The main challenge to simulation is to model the
process as close as possible to reality; otherwise it could produce entirely different performance characteristics from the
ones discovered during actual use. In addition, the simulation study must be repeatable, unbiased, realistic, statistically
sound, and cost‐effective.
Objectives of the Book
The main objectives of this comprehensive and timely book is to: present state‐of‐the‐art methodologies in networks
security, implementation, application and modeling for threats detections and countermeasures; illustrate the benefits of
detection and prevention threats applications in computer networks, modeling, and analysis; identify the main issues that
face efficient and effective countermeasures implementation in network security; demonstrate by examples how the
performance of computer network security can be evaluated; provide cutting edge research on threat detections and
preventions and countermeasures of computer security; present the trends in countermeasures (modeling, application,
analysis,..etc); discuss the main features of current security simulations; point‐ out the main trends in security evaluation
and their tools; introduce the most popular academic and professional computer networks simulators; and finally, provide a
complete compilation of the problems arise during the use of network security and the solutions are applied to them.
CALL FOR CHAPTERS
Target Audience
The intended audience includes academics, researchers, post‐graduate students, developers, professionals, network designers,
network analysts, telecommunication system designers, technology specialists, practitioners, and people who are interested in using
simulation in computer network security. Another projected audience is the researchers and academicians who identify methodologies,
concepts, tools, and applications through reference citations, literature reviews, quantitative/qualitative results, and discussions. The book
is designed to be first choice reference at university libraries, academic institutions, research and development centers, information
technology centers, and any institutions interested in using, design, modeling, and analyzing computer networks security. The book is
designed to be used as a textbook for courses teaching computer networks security, simulation, and modeling for under/post graduate
students.
Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to Network security, simulation, techniques,
and applications. Recommended topics include, but are not limited to, the following:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
Security Principles.
Security Simulation.
Attacks Techniques.
Authentication Techniques.
Cryptography Techniques.
Threats Detection and Prevention.
E- Mail Security.
Network Security
Countermeasures in Network Security.
Database Security.
Biometric Security.
Data Mining Algorithms.
Management Information Security.
Cloud Computing Security.
Cyber Security.
Mobile Security.
Steganography.
Banking Security.
E-Commerce Security.
E-Bay Security.
Social Media Security.
Wireless Security.
Digital Signatures
Simulation in Design and Modeling of Network Security
Submission Procedure
Individuals interested in submitting chapters on the above‐suggested topics or other related topics should submit a 2‐3 page chapter
proposal clearly explaining the mission and objectives of the proposed chapter to editors Alaa H. Al-Hamami and Ghossoon M.W.
Al-Sadoon at threatcounter2013@yahoo.co.uk by no later than October 1, 2013. We strongly encourage other topics that have not been
listed previously, particularly if the topic is related to the research area in which you have expertise. Upon acceptance of your proposal,
you will have until December 30, 2013 to prepare your full chapter of 8,000‐10,000 words with 7‐10 related terms and their appropriate
definitions. Guidelines for preparing your paper and terms and definitions will be sent to you upon acceptance of your proposal. All full
chapters will undergo a double blind review process, and chapter authors may be used as reviewers.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference”
(formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science
Reference” imprints. For additional information regarding the publisher, please visit www.igi‐global.com. This publication is scheduled to
be released in 2014.
Important Dates













Proposals submission deadline: September 30, 2013 
Notification of proposals acceptance: October 15, 2013
Full chapter submission deadline: December 31, 2013 
Review results to authors: January 15, 2014. 
Revised chapter submission deadline: February 15, 2014.
Final acceptance notifications: March 14, 2014.
Submission of Final Chapters deadline: April 15, 2014.
Editorial Advisory Board Members:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Prof.Dr.Hasan Alsaedy, Dean ,UK, hasan@bite.ac.uk
Prof.Dr.Wasim Al-Hamdani, Kentucky State University ,USA,Wasim.al-hamdani@kysu.edu
Prof.Dr.Abbas Al-bakry, Head of Computer Department ,Iraq, Abbasmoh67@yahoo.com
Prof.Dr. Ali Shamim , Dean ,Pakistan, Ali_akbar_shamim@hotmail.com
Prof.Dr. Eng. Sattar Almaliky, Head of IEEE Sector, Iraq, drengsattar@yahoo.com
Prof.Dr.Abdul Monem Rahma, Head of Computer Department , Iraq, monemrahma@yahoo.com
Prof.Dr.Abdel-Badeeh Salem, Dean, Egypt , abmsalem@yahoo.com
Prof.Dr. S. Karthik, Dean, India , profskarthik@yahoo.com
Asso.Prof.Dr.Imad Alshakhly , Lecturer , Malaysia , imadyaseen39@yahoo.com
Asso.Prof.Dr.Hussein Al-Bahadili, Lecturer , Jordan ,hbahadili@yahoo.com
Inquiries and submissions can be forwarded electronically (Word document) or by mail to:
Prof. Dr. Alaa Hussein Al-Hamami
College of Computer Sciences and informatics
Department of Computer Sciences
Amman Arab University ,Jordan
P. O. Box 2234, Amman 11942, Jordan
Tel.: +962 6 5540040 (Ext. 303)
Fax: +962 6 5510819
Ph.p : +962 796789621
Email: threatcounter2013@yahoo.co.uk
Dr. Ghossoon Al-Sadoon
Applied Sciences University,
Administrative Sciences College
Kingdom of Bahrain
P.O.B 5055, Villa 351, Road 141, Block 340, Juffair
Tel.hone: +973 1772877
Fax: + 973 17728951
Ph.p :+97336911440
Email: threatcounter2013@yahoo.co.uk
http://www.igi-global.com/publish/call-for-papers/call-details/1059
Download