posted by user: mobilenetwork || 2127 views || tracked by 3 users: [display]

ADIoT Workshop - IEEE CNS 2018 : International Workshop on Attacks and Defenses for Internet-of-Things


When May 30, 2018 - May 30, 2018
Where Beijing
Submission Deadline Mar 16, 2018
Notification Due Mar 26, 2018
Final Version Due Apr 2, 2018
Categories    IOT   security   defence   attack

Call For Papers

The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2018) will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Special Issue Note - The selected best papers will have a chance to be included in a special issue on IoT security of Journal of Information Security and Applications (JISA) and Wireless Communications and Mobile Computing (WCMC).

Topics of interest include, but are not limited to the ones listed below.
• Malware and unwanted software for IoT
• Vulnerability analysis and reverse engineering for IoT
• IoT security and privacy
• IoT forensic techniques
• Usable security and privacy for IoT
• Intrusion detection and prevention for IoT
• Cyber intelligence techniques for IoT
• IoT infrastructures and mitigation techniques
• IoT Hardware security
• Cyber physical systems security
• Adversarial learning for IoT
• IoT Cyber crime
• Denial-of-Service attacks for IoT
• Security measurement for IoT
• IoT security visualization techniques
• Edge/Fog computing attack and defense

Submission Instructions:

All submitted papers must contain only original work, which has not been published by or is currently under review for any other journal or conference. All submissions must be written in English with a maximum paper length of 9 pages (10-point font) using the two-column IEEE conference format. Accepted papers must be presented by an author (or a substitute non-author presenter approved by the workshop chair prior to the workshop) in order to be included in the final IEEE CNS Proceeding.

Papers should be submitted using EDAS submission system. The submission link is here.

Important Dates:
Submission Deadline: March 16, 2018 (Hard)
Acceptance Notification: March 26, 2018
Camera Ready: April 2, 2018


-General Chair:
Anthony T.S. Ho, University of Surrey, UK

-Program Chairs:
Weizhi Meng, Technical University of Denmark, Denmark
Shouhuai Xu, University of Texas at San Antonio, US
Qian Chen, University of Texas at San Antonio, US

Related Resources

IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
IWUAS 2020   2020 International Workshop on Unmanned Aircraft Systems (IWUAS 2020)
RAID 2019   International Symposium on Research in Attacks, Intrusions and Defenses
SP 2020   IEEE Symposium on Security and Privacy
ADIoT 2019   2nd International Workshop on Attacks and Defenses for Internet-of-Things (ESORICS)
CBIoT 2020   International Conference on Cloud, Big Data and IoT
BCIOT for COINS 2020   Special Track on Blockchain and Internet of Things (IoT) for IEEE International Conference on Omni-layer Intelligent Systems
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
BSP-IoT 2020   Blockchain Security and Privacy for the Internet of Things
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications