posted by user: mobilenetwork || 4145 views || tracked by 3 users: [display]

ADIoT Workshop - IEEE CNS 2018 : International Workshop on Attacks and Defenses for Internet-of-Things

FacebookTwitterLinkedInGoogle

Link: http://cns2018.ieee-cns.org/node/48
 
When May 30, 2018 - May 30, 2018
Where Beijing
Submission Deadline Mar 16, 2018
Notification Due Mar 26, 2018
Final Version Due Apr 2, 2018
Categories    IOT   security   defence   attack
 

Call For Papers

The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms.

International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT 2018) will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Special Issue Note - The selected best papers will have a chance to be included in a special issue on IoT security of Journal of Information Security and Applications (JISA) and Wireless Communications and Mobile Computing (WCMC).

Topics of interest include, but are not limited to the ones listed below.
• Malware and unwanted software for IoT
• Vulnerability analysis and reverse engineering for IoT
• IoT security and privacy
• IoT forensic techniques
• Usable security and privacy for IoT
• Intrusion detection and prevention for IoT
• Cyber intelligence techniques for IoT
• IoT infrastructures and mitigation techniques
• IoT Hardware security
• Cyber physical systems security
• Adversarial learning for IoT
• IoT Cyber crime
• Denial-of-Service attacks for IoT
• Security measurement for IoT
• IoT security visualization techniques
• Edge/Fog computing attack and defense

Submission Instructions:

All submitted papers must contain only original work, which has not been published by or is currently under review for any other journal or conference. All submissions must be written in English with a maximum paper length of 9 pages (10-point font) using the two-column IEEE conference format. Accepted papers must be presented by an author (or a substitute non-author presenter approved by the workshop chair prior to the workshop) in order to be included in the final IEEE CNS Proceeding.

Papers should be submitted using EDAS submission system. The submission link is here.
https://edas.info/newPaper.php?c=24332

Important Dates:
Submission Deadline: March 16, 2018 (Hard)
Acceptance Notification: March 26, 2018
Camera Ready: April 2, 2018


Committees

-General Chair:
Anthony T.S. Ho, University of Surrey, UK

-Program Chairs:
Weizhi Meng, Technical University of Denmark, Denmark
Shouhuai Xu, University of Texas at San Antonio, US
Qian Chen, University of Texas at San Antonio, US

Related Resources

Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE SmartIoT 2025   The 9th IEEE International Conference on Smart Internet of Things (SmartIoT 2025)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
RAID 2025   The 28th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2025)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
RAID 2025   The 28th International Symposium on Research in Attacks, Intrusions, and Defenses
CoUDP 2025   2025 International Conference on Urban Design and Planning (CoUDP 2025)
Integrating Embodied Intelligence and Io 2025   Intelligent Computing: Special Issue: Advanced Intelligent Computation for Integrating Embodied Intelligence and IoT Systems
SECRYPT 2025   22nd International Conference on Security and Cryptography