CALL FOR CHAPTERS CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: September 30, 2013 Threat Detection and Countermeasures in Network Security A book edited by Prof. Dr. Alaa Hussein Al-Hamami (Amman Arab University, Jordan) and Dr. Ghossoon M. Waleed Al-Saadoon (Applied Sciences University, kingdom of Bahrain) To be published by IGI Global: http://www.igi-global.com/publish/call-for-papers/call-details/1059 For release in the Advances in Information Security, Privacy, & Ethics (AISPE) Book Series. Introduction Nowadays, the field of security is facing more challenges than ever due to the fact that “Perfect Security is not exist” and to the innovation in e-business applications, which need more security and trust in doing business. There is a facto also concerning the new technology because “New technology brings new threats”. Security will continue its mission of promoting high level research efforts and novel applications through specialized research issues. Security constitutes many important topics for novel and future oriented research. Prospective authors are invited to submit manuscripts for possible publication in Threat Detection and Countermeasures in Network Security. This book will publish original material concerned with all aspects of security on network threats detection and prevention, security countermeasures and algorithms, modeling, analysis, management, implementation, theories, and performance evaluation. The primary mission of the book is to be influential in the improvement and development of the theory and practice of countermeasures in network security and its theories, algorithms, applications and modeling, appealing to academics, researchers, and professionals. In the information technology age, and with tremendous advancement in computer and communication technologies, network security has become an integral part of many applications and organizations. It is our further aim to provide enough examples to educate organizations on how they can benefit from network security, evaluate the performance, and manage these valuable resources. Computer security theories are widely‐used in investigating the performance of existing and proposed computer networks security, protocols, algorithms, models, applications, etc. The application of network security can potentially improve the quality and effectiveness of network design and modeling. It is generally unfeasible to implement a network security design, protocol, algorithm, or model before valid tests are performed to evaluate their performance. It is clear that testing and evaluating such implementations with real hardware is quite complex, in terms of the manpower, time, and other resources. The preferred alternative is to model these algorithms in a detailed simulator and then perform various scenarios to measure their performance for various patterns of realistic computer networks environments (e.g., connection media, node densities, node mobility, transmission range, size of traffic, etc…). The main challenge to simulation is to model the process as close as possible to reality; otherwise it could produce entirely different performance characteristics from the ones discovered during actual use. In addition, the simulation study must be repeatable, unbiased, realistic, statistically sound, and cost‐effective. Objectives of the Book The main objectives of this comprehensive and timely book is to: present state‐of‐the‐art methodologies in networks security, implementation, application and modeling for threats detections and countermeasures; illustrate the benefits of detection and prevention threats applications in computer networks, modeling, and analysis; identify the main issues that face efficient and effective countermeasures implementation in network security; demonstrate by examples how the performance of computer network security can be evaluated; provide cutting edge research on threat detections and preventions and countermeasures of computer security; present the trends in countermeasures (modeling, application, analysis,..etc); discuss the main features of current security simulations; point‐ out the main trends in security evaluation and their tools; introduce the most popular academic and professional computer networks simulators; and finally, provide a complete compilation of the problems arise during the use of network security and the solutions are applied to them. CALL FOR CHAPTERS Target Audience The intended audience includes academics, researchers, post‐graduate students, developers, professionals, network designers, network analysts, telecommunication system designers, technology specialists, practitioners, and people who are interested in using simulation in computer network security. Another projected audience is the researchers and academicians who identify methodologies, concepts, tools, and applications through reference citations, literature reviews, quantitative/qualitative results, and discussions. The book is designed to be first choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in using, design, modeling, and analyzing computer networks security. The book is designed to be used as a textbook for courses teaching computer networks security, simulation, and modeling for under/post graduate students. Recommended Topics Contributors are welcome to submit chapters on the following topics relating to Network security, simulation, techniques, and applications. Recommended topics include, but are not limited to, the following: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. Security Principles. Security Simulation. Attacks Techniques. Authentication Techniques. Cryptography Techniques. Threats Detection and Prevention. E- Mail Security. Network Security Countermeasures in Network Security. Database Security. Biometric Security. Data Mining Algorithms. Management Information Security. Cloud Computing Security. Cyber Security. Mobile Security. Steganography. Banking Security. E-Commerce Security. E-Bay Security. Social Media Security. Wireless Security. Digital Signatures Simulation in Design and Modeling of Network Security Submission Procedure Individuals interested in submitting chapters on the above‐suggested topics or other related topics should submit a 2‐3 page chapter proposal clearly explaining the mission and objectives of the proposed chapter to editors Alaa H. Al-Hamami and Ghossoon M.W. Al-Sadoon at threatcounter2013@yahoo.co.uk by no later than October 1, 2013. We strongly encourage other topics that have not been listed previously, particularly if the topic is related to the research area in which you have expertise. Upon acceptance of your proposal, you will have until December 30, 2013 to prepare your full chapter of 8,000‐10,000 words with 7‐10 related terms and their appropriate definitions. Guidelines for preparing your paper and terms and definitions will be sent to you upon acceptance of your proposal. All full chapters will undergo a double blind review process, and chapter authors may be used as reviewers. Publisher This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi‐global.com. This publication is scheduled to be released in 2014. Important Dates Proposals submission deadline: September 30, 2013 Notification of proposals acceptance: October 15, 2013 Full chapter submission deadline: December 31, 2013 Review results to authors: January 15, 2014. Revised chapter submission deadline: February 15, 2014. Final acceptance notifications: March 14, 2014. Submission of Final Chapters deadline: April 15, 2014. Editorial Advisory Board Members: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Prof.Dr.Hasan Alsaedy, Dean ,UK, hasan@bite.ac.uk Prof.Dr.Wasim Al-Hamdani, Kentucky State University ,USA,Wasim.al-hamdani@kysu.edu Prof.Dr.Abbas Al-bakry, Head of Computer Department ,Iraq, Abbasmoh67@yahoo.com Prof.Dr. Ali Shamim , Dean ,Pakistan, Ali_akbar_shamim@hotmail.com Prof.Dr. Eng. Sattar Almaliky, Head of IEEE Sector, Iraq, drengsattar@yahoo.com Prof.Dr.Abdul Monem Rahma, Head of Computer Department , Iraq, monemrahma@yahoo.com Prof.Dr.Abdel-Badeeh Salem, Dean, Egypt , abmsalem@yahoo.com Prof.Dr. S. Karthik, Dean, India , profskarthik@yahoo.com Asso.Prof.Dr.Imad Alshakhly , Lecturer , Malaysia , imadyaseen39@yahoo.com Asso.Prof.Dr.Hussein Al-Bahadili, Lecturer , Jordan ,hbahadili@yahoo.com Inquiries and submissions can be forwarded electronically (Word document) or by mail to: Prof. Dr. Alaa Hussein Al-Hamami College of Computer Sciences and informatics Department of Computer Sciences Amman Arab University ,Jordan P. O. Box 2234, Amman 11942, Jordan Tel.: +962 6 5540040 (Ext. 303) Fax: +962 6 5510819 Ph.p : +962 796789621 Email: threatcounter2013@yahoo.co.uk Dr. Ghossoon Al-Sadoon Applied Sciences University, Administrative Sciences College Kingdom of Bahrain P.O.B 5055, Villa 351, Road 141, Block 340, Juffair Tel.hone: +973 1772877 Fax: + 973 17728951 Ph.p :+97336911440 Email: threatcounter2013@yahoo.co.uk http://www.igi-global.com/publish/call-for-papers/call-details/1059