Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    WPDWIMOB09 2009 - Second International Workshop on War and Peace Driving (WPDWiMob09)

    View: 1506

    Website http://www.glyndwr.ac.uk/computing/research/wimob2009 | Want to Edit it Edit Freely

    Category WPDWIMOB09 2009

    Deadline: June 07, 2009 | Date: October 12, 2009

    Venue/Country: Marrakech, Morocco

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    Second International Workshop on War and Peace Driving (WPDWiMob09)

    http://www.glyndwr.ac.uk/computing/research/wimob2009/

    In conjunction with

    WiMob 2009

    Marrakech, Morocco

    October 12th-14th, 2009

    http://conferences.computer.org/wimob2009/

    Scope

    The scope of the workshop covers issues relating to both security

    technologies and the

    socio-economical impact of the widespread uptake of wireless networking by

    those in business,

    industry and the general public.

    The term war driving is widely recognised as describing the activities

    undertaken by those

    who may intend to illegally access a computer network. As one method of

    addressing security

    concerns and raising awareness of these issues, we propose the term peace

    driving to begin

    to describe exploration and research activities within the wireless

    domain.

    Wireless networking is incredibly widespread and is now commonplace in

    industry, academia,

    business, and the home. The very nature of wireless radio signals means

    that physical

    security measures have all but become redundant in protecting computer

    systems and networks

    from unauthorised access. This means that software-based security is now

    of paramount

    importance. Access control, encryption and authentication are key to

    ensuring that intruders

    remain outside the private network.

    In particular, the lack of physical constraints means that security issues

    are becoming more

    and more relevant to the casual Internet user at home, the majority of who

    are non-specialists.

    Casual users employing wireless networking technology may not be aware of

    the activities taking

    place without their knowledge. The uptake of wireless networking therefore

    impacts upon society

    in general and has numerous legal, ethical and sociological issues, as

    well as technological.

    This workshop aims to address issues relating to unwanted wireless network

    access, war driving,

    security mechanisms, encryption, and authentication techniques. We equally

    value topics relating

    to security awareness for the non-specialist, legal and ethical issues,

    and sociological matters

    relating to wireless networking.

    Topics of Interest

    Topics of interest include but are not limited to:

    - Authentication

    - Auditing tools

    - Case studies

    - Emerging threats & trends

    - Encryption

    - Ethical, social and legal issues

    - Filtering

    - Geographical network studies

    - Intruder detection & prevention

    - Network management

    - Protocols & standards

    - Penetration testing

    - Security policies

    - Security tools

    - Threat analysis

    - Threat tools

    - User impact

    - Wireless uptake

    Important Dates

    Paper submission due: June 7, 2009

    Paper acceptance notification: July 26, 2009

    Final manuscript due: August 10, 2009

    Registration: August 20, 2009

    Workshop: October 12, 2009

    Paper Submission

    Submitted papers must represent original material that is not currently

    under review in

    any other conference or journal, and has not been previously published.

    Paper length

    should not exceed five-page technical paper manuscript. Please see author

    information

    page for submission guidelines at WiMob 2009 website

    (http://conferences.computer.org/wimob2009/WorkshopsSymposia.html). Papers

    should be

    submitted in a PDF format through EDAS.

    Submissions should include a cover page with authors' names, affiliations,

    fax and

    telephone numbers and e-mail addresses. All accepted papers will be

    published in the

    conference proceedings. At least one author of accepted papers is required

    to register

    at the full registration rate.

    Contact

    Stuart Cunningham (s(dot)cunningham(at)glyndwr.ac.uk)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.