posted by organizer: gkvk70 || 6254 views || tracked by 14 users: [display]

IoT-CyberTrust 2018 : IEEE Computer Special Issue on Cybertrust in the IoT Age

FacebookTwitterLinkedInGoogle

Link: https://www.computer.org/computer-magazine/2017/07/10/cybertrust-in-the-iot-age-call-for-papers/
 
When N/A
Where N/A
Abstract Registration Due Nov 1, 2017
Submission Deadline Dec 1, 2017
Categories    IOT   security   privacy
 

Call For Papers

IEEE Computer plans a special issue on cybertrust in the IoT age.

In today's technology world, computing and communications are embedded in products as mundane as lightbulbs and kitchen faucets. These capabilities have enabled the Internet of Things (IoT), which we should more accurately call the networks of things: subnets of devices not necessarily connected to the global Internet. There will be an estimated 20 billion to 50 billion IoT devices within the next three years.

This technology has generated new opportunities in many areas but has also created new challenges for providing security and trustworthiness. Changes are inevitable to meet these challenges.

What will be required to provide trust in such an environment? What new opportunities will the IoT bring? This special issue will explore such questions via high-quality contributions from industry, government, and academia on the rapidly changing landscape for device and IoT trustworthiness.

Topics of interest include, but are not limited to, the following:

-IoT-powered botnets
-privacy issues in beacon-enabled location-tracking systems
-forensics on IoT devices
-human-computer interaction methods—and their security and privacy issues—for IoT systems
-reverse engineering and automated analysis of IoT malware
-security and privacy in IoT operating systems and middleware
-security for smart-payment applications, including those using near field communication
-IoT standardization efforts
-IoT testbeds, case studies, and proofs of concept
-IoT traffic monitoring and intrusion detection
-virtualization solutions for IoT security
-security and privacy for IoT-based smart cities
-IoT security’s ethical, legal, and social considerations
-biometric IoT
-cyberattack detection and prevention systems for IoT networks
-cloud-computing-based security solutions for IoT data
-heterogeneous IoT’s security and privacy issues
-Cloud of Things security and privacy
-lightweight cryptography
-cryptocurrency and ransomware
-blockchain and distributed ledger with IoT
-false information and “fake news”

Only submissions that describe previously unpublished, original, state-of-the-art research and that aren’t currently under review by a conference or journal will be considered. Extended journal versions of conference papers must be at least 30 percent different from the original conference works.

There is a strict 6,000-word limit (figures and tables are equivalent to 300 words each) with a maximum of 15 references. The writing style should be down to earth, practical, and original, and the article should be understandable by a broad audience of people interested in security, privacy, and dependability. Authors should not assume that the audience has specialized experience in a particular subfield.

All manuscripts are subject to peer review on both technical merit and relevance to Computer’s readership. Accepted papers will be professionally edited for content and style. For accepted papers, authors will be required to provide electronic files for each figure according to the following guidelines: for graphs and charts, authors must submit them in their original editable source format (PDF, Visio, Excel, Word, PowerPoint, etc.); for screenshots or photographs, authors must submit high-resolution files (300 dpi or higher at the largest possible dimensions) in JPEG or TIFF formats.

Authors of accepted papers are encouraged to submit multimedia, such as a 2- to 4-minute podcast, videos, or an audio or audio/video interview of the authors by an expert in the field, which Computer staff can help facilitate, record, and edit.

Guest editors:

Jeff Voas, US National Institute of Standards and Technology
Rick Kuhn, US National Institute of Standards and Technology
Constantinos Kolias, George Mason University
Angelos Stavrou, George Mason University
Georgios Kambourakis, University of the Aegean

Related Resources

IEEE CIIoT 2021   IEEE Symposium on Computational Intelligence in IoT and Smart Cities
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
SI on SPIHG 2022   IEEE S&P CfP: Special Issue on Security and Privacy Issues of Home Globalization
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
IoT Edge Computing AI 2021   Edge Computing Optimization Using Artificial Intelligence Methods
CIoT 2021   3rd International Conference on Internet of Things
AIKE 2021   IEEE Artificial Intelligence & Knowledge Engineering 2021
CRYPIS 2021   10th International Conference on Cryptography and Information Security
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
BDIoT 2021   5th International Conference on Big Data and Internet of Things - BDIoT’21