| |||||||||||
Future Internet SI 2020 : Future Internet SI on Information and Future Internet Security, Trust and Privacy | |||||||||||
Link: https://www.mdpi.com/journal/futureinternet/special_issues/ICICS2020 | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
Dear Colleagues,
Currently, the Internet of things (IoT) enables billions of Internet-connected devices, e.g., smart sensors, to communicate and interact with each other over the network/internet worldwide. It can offer remote monitoring and control, and is being adopted in many domains. For example, it is the basis for smart cities, helping achieve better quality of life and lower consumption of resources. In addition, smartphones should be the most commonly used IoT devices, which can help control washing machines, refrigerators, or cars. However, IoT also faces many challenges concerning information and internet security. For example, attackers can impersonate a relay node to compromise the information integrity during the communications. When they control or infect several internal nodes in an IoT network, the security of the whole distributed environment would be greatly threatened. Hence, there is a need to safeguard information and the Internet environment against the plethora of modern external and internal threats. This Special Issue will focus on information and Internet security with the attempt to solicit the latest technologies, solutions, case studies, and prototypes on this topic. This Special Issue is open to all submissions, while some outstanding papers from the 22nd International Conference on Information and Communications Security (ICICS 2020, Copenhagen, Denmark, 24-27 August 2020, https://icics2020.compute.dtu.dk/) will be invited to this Special Issue. Topics of interest include, but are limited to, the following: Access control Social networks security, privacy, and trust Key management and key recovery Software-defined networking security Anonymity Embedded systems security Language-based security Security management Applied cryptography Security models, metrics, and policies Malware and anti-malware Fraud and cyber-crime Authentication and authorization Security and privacy of Big Data Mobile computing security and privacy Hardware security Biometrics security Security of critical infrastructures Network security Trusted and trustworthy computing technologies Blockchain security and privacy Trust and reputation systems Operating systems security Usable security and privacy Computer and digital forensics Insider threat detection Cyber-physical systems security Underground economy Privacy protection Intellectual property protection Data and system integrity Verification of security protocols Privacy-preserving data mining Intrusion detection Database security Web security Risk assessment IoT security and privacy Distributed systems security Wireless security Identity access management Cloud and edge computing security ---------------------- The deadline is 31 December 2020. The link: https://www.mdpi.com/journal/futureinternet/special_issues/ICICS2020 |
|