posted by organizer: monika1193 || 1172 views || tracked by 5 users: [display]

SI AID 2024 : SPECIAL ISSUE on Adaptive Intrusion Detection System using Machine Learning in Wireless Sensor Networks

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/comp/html
 
When N/A
Where N/A
Submission Deadline Jun 15, 2024
Categories    computer science   machine learning
 

Call For Papers

๐™Ž๐™‹๐™€๐˜พ๐™„๐˜ผ๐™‡ ๐™„๐™Ž๐™Ž๐™๐™€ ๐™ค๐™ฃ ๐˜ผ๐™™๐™–๐™ฅ๐™ฉ๐™ž๐™ซ๐™š ๐™„๐™ฃ๐™ฉ๐™ง๐™ช๐™จ๐™ž๐™ค๐™ฃ ๐˜ฟ๐™š๐™ฉ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฎ๐™จ๐™ฉ๐™š๐™ข ๐™ช๐™จ๐™ž๐™ฃ๐™œ ๐™ˆ๐™–๐™˜๐™๐™ž๐™ฃ๐™š ๐™‡๐™š๐™–๐™ง๐™ฃ๐™ž๐™ฃ๐™œ ๐™ž๐™ฃ ๐™’๐™ž๐™ง๐™š๐™ก๐™š๐™จ๐™จ ๐™Ž๐™š๐™ฃ๐™จ๐™ค๐™ง ๐™‰๐™š๐™ฉ๐™ฌ๐™ค๐™ง๐™ ๐™จ

This special issue in ๐—ข๐—ฝ๐—ฒ๐—ป ๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ฆ๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ (๐—œ๐—™ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฎ: ๐Ÿญ.๐Ÿฑ) focuses on A vast variety of detection nodes make up a Wireless Sensor Networks (WSN), which collects and sends data to a central point. However, distribution tactics, communications channels, and limited supply nodes provide a number of safety concerns for WSN. Therefore, in order to enhance the security aspects of wireless sensor networks, it is imperative to identify unauthorized access. These functions are given to the network-by-network intrusion detection systems, and they are necessary for all interactions on the network. Intrusion Detection Systems (IDS) frequently include Machine Learning (ML) approaches; yet, ML techniques' effectiveness is subpar when managing unbalanced assaults. According to their inadequate rechargeable energy supply, small bandwidth assistance, data travel over multiple hop nodes, reliance on intermediaries or other nodes, dispersed nature, and organization, WSN nodes are vulnerable to a variety of security-related attacks.

The widespread use of WSN presents issues for maintaining their secrecy, credibility, and reliability. Intrusion detection serves as a strong first line of defense for the WSNs and is a crucial active defense mechanism. The disparity between dependable information distribution and restricted sensing power, as well as the dispute over the impact of detection and the scarcity of network resources, must be balanced given the special characteristics of WSN. WSN may overcome the drawbacks of conventional monitoring techniques, which considerably lower the expense of detection while also streamlining the laborious procedure. WSN assaults are visible at every model tier. Because of this, wireless sensor nodes face a variety of problems. Some are connected to technical concerns, while others arise as a result of assaults. To identify and stop threats, defensive and network monitoring systems must be built. The ability to create an affordable ML model for quick intrusion detection and prevention in border regions using WSN is made possible by the notable rise in appeal of accessible ML algorithms and the sharp rise in the utilization of artificial data. However, extra protection precautions need to be taken since WSNs differ from typical networks in terms of design and technology. To guarantee WSN security, an IDS is modelled in this work. A hybrid architecture that combines the use of authorization, overuse, and anomaly-based detection techniques with intrusion detection systems is suggested because these techniques alone are unable to offer reliability. A compact intelligent intrusion detection model for WSN is proposed in this special issue. With the use of anomalous network data, our model can detect attack behaviors in WSNs with speed and accuracy. Therefore, the supervised neural network satisfies the criterion of convenient data analysis in contrast with different machine learning methods

Potential topics include, but are not limited to:
โ€ข Machine learning approaches for Intrusion detection in wireless sensor networks.
โ€ข A hierarchical neural network-based intrusion detection solution for wireless sensor networks.
โ€ข A cooperative intrusion detection technology optimized for wireless sensor networks.
โ€ข An extensively artificial network-based self-adaptive technique for wireless intrusion detection.
โ€ข A thin-layer proactive intrusion detection structure for wireless sensor networks.
โ€ข Regarding the viability of machine learning for intrusion detection in sensor networks.
โ€ข Efficient supporting vector machine-based intrusion detection method for wireless sensor networks.
โ€ข Machine learning-based intrusion detection system with optimization support in wireless sensor networks.
โ€ข Designing Intrusion Detection Systems in Wireless Sensor Networks via Machine Learning Technologies.
โ€ข A wireless Internet of things intrusion detection solution powered by machine learning.
โ€ข Developing autonomous machine learning network intrusion detection solutions for abuse.

Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process.

===
๐‘ฎ๐‘ผ๐‘ฌ๐‘บ๐‘ป ๐‘ฌ๐‘ซ๐‘ฐ๐‘ป๐‘ถ๐‘น๐‘บ

Tarek Moulahi, Qassim University, Saudi Arabia.
Rateb Jabbar, Qatar University, Qatar.
Musab Al-Ghadi, La Rochelle University, France.

๐˜ผ๐˜ฟ๐™‘๐™„๐™Ž๐™Š๐™๐™” ๐™€๐˜ฟ๐™„๐™๐™Š๐™
Christos Anagnostopoulos, University of Glasgow, United Kingdom

===
๐‘ซ๐‘ฌ๐‘จ๐‘ซ๐‘ณ๐‘ฐ๐‘ต๐‘ฌ

The deadline for submissions is ๐—๐—จ๐—ก๐—˜ ๐Ÿญ๐Ÿฑ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ, but individual papers will be reviewed and published online on an ongoing basis.

===
๐‘ฏ๐‘ถ๐‘พ ๐‘ป๐‘ถ ๐‘บ๐‘ผ๐‘ฉ๐‘ด๐‘ฐ๐‘ป

All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager:

๐—ต๐˜๐˜๐—ฝ๐˜€://๐˜„๐˜„๐˜„.๐—ฒ๐—ฑ๐—ถ๐˜๐—ผ๐—ฟ๐—ถ๐—ฎ๐—น๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—ฟ.๐—ฐ๐—ผ๐—บ/๐—ผ๐—ฝ๐—ฒ๐—ป๐—ฐ๐˜€/๐—ฑ๐—ฒ๐—ณ๐—ฎ๐˜‚๐—น๐˜๐Ÿฎ.๐—ฎ๐˜€๐—ฝ๐˜…

Please choose the article type โ€œ๐™Ž๐™„: ๐˜ผ๐™™๐™–๐™ฅ๐™ฉ๐™ž๐™ซ๐™š ๐™„๐™ฃ๐™ฉ๐™ง๐™ช๐™จ๐™ž๐™ค๐™ฃ ๐˜ฟ๐™š๐™ฉ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃ ๐™Ž๐™ฎ๐™จ๐™ฉ๐™š๐™ข ๐™ช๐™จ๐™ž๐™ฃ๐™œ ๐™ˆ๐™‡ ๐™ž๐™ฃ ๐™’๐™Ž๐™‰โ€.

===
๐‘ช๐‘ถ๐‘ต๐‘ป๐‘จ๐‘ช๐‘ป

๐—ผ๐—ฝ๐—ฒ๐—ป๐—ฐ๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ๐˜€๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ@๐—ฑ๐—ฒ๐—ด๐—ฟ๐˜‚๐˜†๐˜๐—ฒ๐—ฟ.๐—ฐ๐—ผ๐—บ

===
๐—™๐—ผ๐—ฟ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ถ๐—ป๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป, ๐—ฝ๐—น๐—ฒ๐—ฎ๐˜€๐—ฒ ๐˜ƒ๐—ถ๐˜€๐—ถ๐˜ ๐—ผ๐˜‚๐—ฟ ๐˜„๐—ฒ๐—ฏ๐˜€๐—ถ๐˜๐—ฒ.

https://www.degruyter.com/journal/key/comp/html#overview

Related Resources

Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
3L-PERSON 2024   IX INTERNATIONAL WORKSHOP LIFE LONG LEARNING USING ICT: PERSON-ORIENTED APPROACH
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Ei/Scopus-CISDS 2024   2024 3rd International Conference on Communications, Information System and Data Science (CISDS 2024)
DS 2024   Discovery Science 2024
IEEE ICA 2022   The 6th IEEE International Conference on Agents
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
SI AIMLDE 2024   SPECIAL ISSUE on Applied Artificial intelligence, Machine Learning, and Data Engineering
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence๏ผˆACAI 2024๏ผ‰
MLIS 2024   The 6th International Conference on Machine Learning and Intelligent Systems (MLIS 2024)