posted by user: mobilenetwork || 2828 views || tracked by 3 users: [display]

ADIoT Workshop - IEEE CNS 2018 : International Workshop on Attacks and Defenses for Internet-of-Things


When May 30, 2018 - May 30, 2018
Where Beijing
Submission Deadline Mar 16, 2018
Notification Due Mar 26, 2018
Final Version Due Apr 2, 2018
Categories    IOT   security   defence   attack

Call For Papers

The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2018) will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Special Issue Note - The selected best papers will have a chance to be included in a special issue on IoT security of Journal of Information Security and Applications (JISA) and Wireless Communications and Mobile Computing (WCMC).

Topics of interest include, but are not limited to the ones listed below.
• Malware and unwanted software for IoT
• Vulnerability analysis and reverse engineering for IoT
• IoT security and privacy
• IoT forensic techniques
• Usable security and privacy for IoT
• Intrusion detection and prevention for IoT
• Cyber intelligence techniques for IoT
• IoT infrastructures and mitigation techniques
• IoT Hardware security
• Cyber physical systems security
• Adversarial learning for IoT
• IoT Cyber crime
• Denial-of-Service attacks for IoT
• Security measurement for IoT
• IoT security visualization techniques
• Edge/Fog computing attack and defense

Submission Instructions:

All submitted papers must contain only original work, which has not been published by or is currently under review for any other journal or conference. All submissions must be written in English with a maximum paper length of 9 pages (10-point font) using the two-column IEEE conference format. Accepted papers must be presented by an author (or a substitute non-author presenter approved by the workshop chair prior to the workshop) in order to be included in the final IEEE CNS Proceeding.

Papers should be submitted using EDAS submission system. The submission link is here.

Important Dates:
Submission Deadline: March 16, 2018 (Hard)
Acceptance Notification: March 26, 2018
Camera Ready: April 2, 2018


-General Chair:
Anthony T.S. Ho, University of Surrey, UK

-Program Chairs:
Weizhi Meng, Technical University of Denmark, Denmark
Shouhuai Xu, University of Texas at San Antonio, US
Qian Chen, University of Texas at San Antonio, US

Related Resources

RAID 2021   Research in Attacks, Intrusions and Defenses
CIoT 2021   3rd International Conference on Internet of Things
IEEE CIIoT 2021   IEEE Symposium on Computational Intelligence in IoT and Smart Cities
IOTBS 2021   International Conference on IOT, Big Data and Security
BDIoT 2021   5th International Conference on Big Data and Internet of Things - BDIoT’21
BIOM 2021   International Conference on Big Data, IoT and Machine Learning
MADWeb 2021   Workshop on Measurements, Attacks, and Defenses for the Web
IJITCS 2021   International Journal of Information Technology Convergence and services
IOTSMS 2021   he 8th International Conference on Internet of Things: Systems, Management and Security
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia