| |||||||||||||||
JISA-IoT-A&D 2018 : Recent Advances in Internet-of-Things Attacks and Defences | |||||||||||||||
Link: https://www.journals.elsevier.com/journal-of-information-security-and-applications/call-for-papers/recent-advances-in-internet-of-things-attacks-and-defences | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Journal of Information Security and Applications (JISA), ELSEVIER
URL: http://www.journals.elsevier.com/journal-of-information-security-and-applications SPECIAL ISSUE ON “Recent Advances in Internet-of-Things Attacks and Defences” AIMS & SCOPE The Internet of Things (IoT) facilitates the interconnection and data exchange of modern objects across every aspect of our lives, including our homes, cars, and even our bodies. It is estimated that IoT will consist of nearly 30 billion objects by 2020. However, due to the open nature of Internet connectivity, IoT brings a big challenge for the security community; hackers may exploit critical vulnerabilities in a wide range of IoT applications and devices for carrying out their nefarious activities. As a result, IoT security has already become an issue of high concern. Undoubtedly, in terms of offensive security, there is an urgent need to understand IoT-related attacks. This will help toward designing the appropriate security mechanisms. This special issue focuses on IoT-related attacks and defences, and aims to solicit original research papers that discuss novel ways in compromising and protecting IoT networks and devices. Topics of interest: We encourage the submission of high-quality contributions regarding the recent advances in IoT attacks and defenses. Topics of interest include, but are not limited to the ones listed below. - Malware and unwanted software for IoT - Vulnerability analysis and reverse engineering for IoT - IoT Cyber crime - Denial-of-Service attacks for IoT - IoT security and privacy - IoT forensic techniques - Usable security and privacy for IoT - Intrusion detection and prevention for IoT - Cyber intelligence techniques for IoT - IoT infrastructures and mitigation techniques - IoT Hardware security - Cyber physical systems security - Adversarial learning for IoT - Security measurement for IoT - IoT security visualization techniques Submission Guidelines: Authors should prepare their manuscript according to the guide for authors available from the online submission page of the Journal of Information Security and Applications (JISA) at http://www.journals.elsevier.com/journal-of-information-security-and-applications. ** Authors must select “VSI:IoT Attacks&Defences” when they reach the “Article Type” step in the submission process ** Submitted papers must contain original work, which has neither been previously published nor it is currently under review by another journal or conference. Previously published or accepted conference papers must contain at least 40% new material to be considered for the special issue. All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the corresponding guest editor. Important Dates: Submission deadline: October 30, 2018 Initial notification: February 15, 2019 Final acceptance/rejection notification: April 30, 2019 Guest Editors Dr. Weizhi Meng (Corresponding) Technical University of Denmark, Denmark E-mail: weme@dtu.dk Dr. Constantinos Kolias George Mason University, USA E-mail: kkolias@gmu.edu Dr. Georgios Kambourakis University of the Aegean, Greece E-mail: gkamb@aegean.gr Dr. Jinguang Han University of Surrey, UK E-mail: j.han@surrey.ac.uk |
|