WPDWiMob09 2009 - Second International Workshop on War and Peace Driving (WPDWiMob09)
Topics/Call fo Papers
Second International Workshop on War and Peace Driving (WPDWiMob09)
http://www.glyndwr.ac.uk/computing/research/wimob2...
In conjunction with
WiMob 2009
Marrakech, Morocco
October 12th-14th, 2009
http://conferences.computer.org/wimob2009/
Scope
-----
The scope of the workshop covers issues relating to both security
technologies and the
socio-economical impact of the widespread uptake of wireless networking by
those in business,
industry and the general public.
The term war driving is widely recognised as describing the activities
undertaken by those
who may intend to illegally access a computer network. As one method of
addressing security
concerns and raising awareness of these issues, we propose the term peace
driving to begin
to describe exploration and research activities within the wireless
domain.
Wireless networking is incredibly widespread and is now commonplace in
industry, academia,
business, and the home. The very nature of wireless radio signals means
that physical
security measures have all but become redundant in protecting computer
systems and networks
from unauthorised access. This means that software-based security is now
of paramount
importance. Access control, encryption and authentication are key to
ensuring that intruders
remain outside the private network.
In particular, the lack of physical constraints means that security issues
are becoming more
and more relevant to the casual Internet user at home, the majority of who
are non-specialists.
Casual users employing wireless networking technology may not be aware of
the activities taking
place without their knowledge. The uptake of wireless networking therefore
impacts upon society
in general and has numerous legal, ethical and sociological issues, as
well as technological.
This workshop aims to address issues relating to unwanted wireless network
access, war driving,
security mechanisms, encryption, and authentication techniques. We equally
value topics relating
to security awareness for the non-specialist, legal and ethical issues,
and sociological matters
relating to wireless networking.
Topics of Interest
------------------
Topics of interest include but are not limited to:
- Authentication
- Auditing tools
- Case studies
- Emerging threats & trends
- Encryption
- Ethical, social and legal issues
- Filtering
- Geographical network studies
- Intruder detection & prevention
- Network management
- Protocols & standards
- Penetration testing
- Security policies
- Security tools
- Threat analysis
- Threat tools
- User impact
- Wireless uptake
Important Dates
---------------
Paper submission due: June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due: August 10, 2009
Registration: August 20, 2009
Workshop: October 12, 2009
Paper Submission
----------------
Submitted papers must represent original material that is not currently
under review in
any other conference or journal, and has not been previously published.
Paper length
should not exceed five-page technical paper manuscript. Please see author
information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/Workshop...). Papers
should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations,
fax and
telephone numbers and e-mail addresses. All accepted papers will be
published in the
conference proceedings. At least one author of accepted papers is required
to register
at the full registration rate.
Contact
-------
Stuart Cunningham (s(dot)cunningham(at)glyndwr.ac.uk)
http://www.glyndwr.ac.uk/computing/research/wimob2...
In conjunction with
WiMob 2009
Marrakech, Morocco
October 12th-14th, 2009
http://conferences.computer.org/wimob2009/
Scope
-----
The scope of the workshop covers issues relating to both security
technologies and the
socio-economical impact of the widespread uptake of wireless networking by
those in business,
industry and the general public.
The term war driving is widely recognised as describing the activities
undertaken by those
who may intend to illegally access a computer network. As one method of
addressing security
concerns and raising awareness of these issues, we propose the term peace
driving to begin
to describe exploration and research activities within the wireless
domain.
Wireless networking is incredibly widespread and is now commonplace in
industry, academia,
business, and the home. The very nature of wireless radio signals means
that physical
security measures have all but become redundant in protecting computer
systems and networks
from unauthorised access. This means that software-based security is now
of paramount
importance. Access control, encryption and authentication are key to
ensuring that intruders
remain outside the private network.
In particular, the lack of physical constraints means that security issues
are becoming more
and more relevant to the casual Internet user at home, the majority of who
are non-specialists.
Casual users employing wireless networking technology may not be aware of
the activities taking
place without their knowledge. The uptake of wireless networking therefore
impacts upon society
in general and has numerous legal, ethical and sociological issues, as
well as technological.
This workshop aims to address issues relating to unwanted wireless network
access, war driving,
security mechanisms, encryption, and authentication techniques. We equally
value topics relating
to security awareness for the non-specialist, legal and ethical issues,
and sociological matters
relating to wireless networking.
Topics of Interest
------------------
Topics of interest include but are not limited to:
- Authentication
- Auditing tools
- Case studies
- Emerging threats & trends
- Encryption
- Ethical, social and legal issues
- Filtering
- Geographical network studies
- Intruder detection & prevention
- Network management
- Protocols & standards
- Penetration testing
- Security policies
- Security tools
- Threat analysis
- Threat tools
- User impact
- Wireless uptake
Important Dates
---------------
Paper submission due: June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due: August 10, 2009
Registration: August 20, 2009
Workshop: October 12, 2009
Paper Submission
----------------
Submitted papers must represent original material that is not currently
under review in
any other conference or journal, and has not been previously published.
Paper length
should not exceed five-page technical paper manuscript. Please see author
information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/Workshop...). Papers
should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations,
fax and
telephone numbers and e-mail addresses. All accepted papers will be
published in the
conference proceedings. At least one author of accepted papers is required
to register
at the full registration rate.
Contact
-------
Stuart Cunningham (s(dot)cunningham(at)glyndwr.ac.uk)
Other CFPs
- Third International Workshop on Heterogeneous Wireless Networks: Resource Management and QoS (HWN-RMQ-WiMob 09)
- Workshop on Artificial Intelligence Techniques for Ambient Intelligence (AITAmI'09)
- 9-th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2012)
- Second International Workshop on Green Communications In conjunction with IEEE GLOBECOM 2009
- 2nd International Workshop on Social Aspects of Ubiquitous Computing Environments (SAUCE) 2009
Last modified: 2010-06-04 19:32:22