posted by user: cyberx || 2611 views || tracked by 3 users: [display]

CSRIoT 2019 : The 1st IEEE Services Workshop on Cyber Security and Resilience in the Internet of Things

FacebookTwitterLinkedInGoogle

Link: http://conferences.computer.org/services/2019/workshops/cybersecurity_workshop.html
 
When Jul 8, 2019 - Jul 13, 2019
Where Milan, Italy
Submission Deadline Mar 23, 2019
Notification Due Apr 15, 2019
Final Version Due May 1, 2019
Categories    cybersecurity   resilience   trust   forensics
 

Call For Papers

The technological and industrial revolution brought by the Internet of Things (IoT) comes with new forms of threats and attacks that exploit the inherent complexity and heterogeneity of IoT networks. There are many recent examples of attacks that exploit IoT devices to perform large-scale distributed denial of service attacks, to spy on people, and to hijack communication links, therefore delivering full control of anything that is remotely accessible to an attacker. Those attacks deeply affect the operation of a number of services that are vital for the society functioning as energy, transport, communications, and so on. Moreover, IoT is largely used in monitoring activities of complex systems as smart city, industrial plant, health systems, bridges, and so forth. Because of that, if an IoT system experiences an attack, it should still exhibit resilience in the form of grateful degradation and/or survival and fast recovery (bounce-back/bounce-forward) of the functionality from the eventual failure or misbehavior. IoT resilience is here to understand the strategies and methods for a cyber-attack absorption and infrastructure operational recovery and needs to be considered as an integral part of the IOT Cyber Security landscape. The workshop focuses on both the theoretical & practical aspects of the security, privacy, trust and resilience of IoT networks, devices, applications, and services as well as novel ways of dealing with their vulnerabilities and mitigating sophisticated cyber-attacks. Topics of interest include but are not limited to:

Blockchain applications in IoT
Cyber-threat intelligence
Game-theoretic security for IoT
Identity management and access control for IoT
IoT and cloud forensics
Lightweight cryptography for IoT
Malware detection and mitigation
Network intrusion detection/mitigation
Privacy and data protection in IoT
Security in mobile applications
System and data integrity
Trust management for IOT
Operation recovery and continuity in IOT
Cyber-attack resiliency IoT architecture
Cyber Threat adaptive capacity in IOT
SUBMISSION
We call for original and unpublished papers no longer than 6 pages (up to 2 additional pages may be purchased subject to approval by the Publication Chair.). All papers will be reviewed with a minimum of 3 good-quality reviews per paper. The manuscripts should be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and be submitted as PDF files (formatted for 8.5x11-inch paper).

The submission URL is: https://easychair.org/conferences/?conf=ieeeservices2019

Authors wishing to submit a paper to this workshop must select the track entitled IEEE SERVICES Workshop on Cyber Security and Resilience in the Internet of Things in order to be considered.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SESBC 2024   5th International Conference on Software Engineering, Security and Blockchain
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
COMSCI 2024   3rd International Conference on Computer Science and Information Technology
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
ITNG 2024   The 21st Int'l Conf. on Information Technology: New Generations ITNG 2024
S&P 2025   The 45th IEEE Symposium on Security and Privacy
C3AI 2024   The International Conference on Computing, Communication, Cybersecurity & AI
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI