| |||||||||||||
IoT-SECFOR 2024 : The 8th International Workshop on Security and Forensics of IoT | |||||||||||||
Link: https://www.ares-conference.eu/iot-secfor | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
IoT-SECFOR
The 8th International Workshop on Security and Forensics of IoT to be held in conjunction with the 19th International Conference on Availability, Reliability and Security July 30 – August 02, 2024 Internet-of-Things (IoT) devices are now ubiquously and increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using a plethora of protocols and technologies. It was estimated by Gartner and Statista that a number of devices between 20.4 and 31 billion was in use in 2020, which may rise to 75 billion devices by 2025. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The constantly growing IoT botnets, such as Dark Nexus, emphasize the need to focus on these aspects. This workshop aims to bring together researchers and practitioners from both communities – security and forensics – to discuss problems and solutions regarding IoT. Topics of interest include, but are not limited to Adaptive security in IoT Challenges related to IoT forensics and security Coexistence of different security protocols in IoT Covert communication in IoT Cryptographic protocols and algorithms for IoT Cybercrimes exploiting IoT Data analysis of IoT for forensic investigation Data ownership and attack simulation methods for IoT networks and devices Identification/preservation of evidence for digital forensic investigations involving IoT Intrusion and malware detection/prevention technologies for IoT Legal, ethical and human aspects of security and forensics of IoT Models for risk identification and assessment in IoT networks Privacy and trust in IoT Security and forensic aspects in cyber physical IoT systems Security applications and management of IoT Security architectures and protection mechanisms for IoT Security in Wireless Sensor Networks applied to IoT Threat models and attack strategies for IoT Applications of Artificial Intelligence in security and forensics in IoT Adversarial attacks using IoT Important Dates Submission Deadline April 29, 2024 Author Notification May 29, 2024 Proceedings Version June 18, 2024 Conference July 30 – August 02, 2024 |
|