posted by user: mobilenetwork || 344 views || tracked by 2 users: [display]

ADIoT Workshop - IEEE CNS 2018 : International Workshop on Attacks and Defenses for Internet-of-Things


When May 30, 2018 - May 30, 2018
Where Beijing
Submission Deadline Mar 5, 2018
Notification Due Mar 26, 2018
Final Version Due Apr 2, 2018
Categories    IOT   security   defence   attack

Call For Papers

The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2018) will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Special Issue Note - The selected best papers will have a chance to be included in a special issue on IoT security of Journal of Information Security and Applications (JISA) and Wireless Communications and Mobile Computing (WCMC).

Topics of interest include, but are not limited to the ones listed below.
• Malware and unwanted software for IoT
• Vulnerability analysis and reverse engineering for IoT
• IoT security and privacy
• IoT forensic techniques
• Usable security and privacy for IoT
• Intrusion detection and prevention for IoT
• Cyber intelligence techniques for IoT
• IoT infrastructures and mitigation techniques
• IoT Hardware security
• Cyber physical systems security
• Adversarial learning for IoT
• IoT Cyber crime
• Denial-of-Service attacks for IoT
• Security measurement for IoT
• IoT security visualization techniques
• Edge/Fog computing attack and defense

Submission Instructions:

All submitted papers must contain only original work, which has not been published by or is currently under review for any other journal or conference. All submissions must be written in English with a maximum paper length of 9 pages (10-point font) using the two-column IEEE conference format. Accepted papers must be presented by an author (or a substitute non-author presenter approved by the workshop chair prior to the workshop) in order to be included in the final IEEE CNS Proceeding.

Papers should be submitted using EDAS submission system. The submission link is here.

Important Dates:
Submission Deadline: March 5, 2018 (Hard)
Acceptance Notification: March 26, 2018
Camera Ready: April 2, 2018


-General Chair:
Anthony T.S. Ho, University of Surrey, UK

-Program Chairs:
Weizhi Meng, Technical University of Denmark, Denmark
Shouhuai Xu, University of Texas at San Antonio, US
Qian Chen, University of Texas at San Antonio, US

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IFIP IIP 2018   10th International Conference on Intelligent Information Processing
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
ICIOT 2018   The 3rd International Congress on Internet of Things
ACII 2018   Advanced Computational Intelligence: An International Journal
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
MathSJ 2018   Applied Mathematics and Sciences: An International Journal
ICMU 2018   The 11th International Conference on Mobile Computing and Ubiquitous Networking
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
AmI 2018   2018 European Conference on Ambient Intelligence