posted by organizer: thickicesong || 3871 views || tracked by 8 users: [display]

CPS Security & Privacy 2016 : Call for Book Chapter Proposals for Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley)

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline Aug 31, 2015
Notification Due Sep 15, 2015
Final Version Due Nov 30, 2015
Categories    cybersecurity   privacy   cyber-physical systems   internet of things
 

Call For Papers

Dear Colleague,

We would like to cordially invite you to contribute a book chapter to a forthcoming book entitled "Security and Privacy in Cyber-Physical Systems: Foundations and Applications" which will be published by Wiley.
Call for Chapters

Chapter Proposal Submission by August 31, 2015.

Submission Procedure:
Please email your abstract (max. 500 words) by August 31, 2015 to cps.wiley@gmail.com and indicate the specific chapter where your work best fits or propose your own topic relevant to the theme of the book.

Please provide the following points in your proposals/abstracts:
1. Title of the contribution,
2. Title of the chapter (of the tentative TOC) if the contribution refers to one of them,
3. Name of author, co-authors, institution, email-address,
4. Content/mission of the proposed article.

Authors of accepted proposals will be notified by the given deadline about the status of their proposals and sent chapter guidelines.

The topics of interest include but are not limited to:
Part I: Foundations and Principles
Chapter 1. Cybersecurity and Privacy: Past, Present and Future
Chapter 2. The interplay of Cyber, Physical, and Human elements in CPS
Chapter 3. Adaptive attack mitigation for CPS
Chapter 4. Authentication and access control for CPS
Chapter 5. Availability, recovery and auditing for CPS
Chapter 6. Data security and privacy for CPS
Chapter 7. Intrusion detection for CPS
Chapter 8. Key management in CPS
Chapter 9. Legacy CPS system protection
Chapter 10. Lightweight crypto and security
Chapter 11. Threat modeling for CPS
Chapter 12. Vulnerability analysis for CPS
Part II: Application Domains
Chapter 13. Energy
Chapter 14. Medical
Chapter 15. Transportation
Chapter 16. Physical Infrastructure
Chapter 17. Manufacturing
Chapter 18. Building
Chapter 19. Agriculture
Chapter 20. Robotics
Chapter 21. Unmanned Aerial Vehicles
Chapter 22. Smart Cities
Editors:
Houbing Song, West Virginia University, USA (Houbing.Song@mail.wvu.edu)
Glenn A. Fink, Pacific Northwest National Laboratory, USA (Glenn.Fink@pnnl.gov)
Sabina Jeschke, RWTH Aachen University, Germany (sabina.jeschke@ima-zlw-ifu.rwth-aachen.de)
Gilad L. Rosner, Internet of Things Privacy Forum, UK (gilad@giladrosner.com)

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
HCIS TI CFPs 2018   Call for Papers Thematic Issue of HCIS-Springer (indexed by SCIE)
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
NAACL HLT 2018   The 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies
ICDIS 2018   2018 First International Conference on Data Intelligence and Security
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
SciSec 2018   The 1st International Conference on Science of Cyber Security
WEIS 2018   Workshop on the Economics of Information Security