posted by organizer: thickicesong || 6697 views || tracked by 9 users: [display]

CPS Security & Privacy 2016 : Call for Book Chapter Proposals for Security and Privacy in Cyber-Physical Systems: Foundations and Applications (Wiley)

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline Aug 31, 2015
Notification Due Sep 15, 2015
Final Version Due Nov 30, 2015
Categories    cybersecurity   privacy   cyber-physical systems   internet of things
 

Call For Papers

Dear Colleague,

We would like to cordially invite you to contribute a book chapter to a forthcoming book entitled "Security and Privacy in Cyber-Physical Systems: Foundations and Applications" which will be published by Wiley.
Call for Chapters

Chapter Proposal Submission by August 31, 2015.

Submission Procedure:
Please email your abstract (max. 500 words) by August 31, 2015 to cps.wiley@gmail.com and indicate the specific chapter where your work best fits or propose your own topic relevant to the theme of the book.

Please provide the following points in your proposals/abstracts:
1. Title of the contribution,
2. Title of the chapter (of the tentative TOC) if the contribution refers to one of them,
3. Name of author, co-authors, institution, email-address,
4. Content/mission of the proposed article.

Authors of accepted proposals will be notified by the given deadline about the status of their proposals and sent chapter guidelines.

The topics of interest include but are not limited to:
Part I: Foundations and Principles
Chapter 1. Cybersecurity and Privacy: Past, Present and Future
Chapter 2. The interplay of Cyber, Physical, and Human elements in CPS
Chapter 3. Adaptive attack mitigation for CPS
Chapter 4. Authentication and access control for CPS
Chapter 5. Availability, recovery and auditing for CPS
Chapter 6. Data security and privacy for CPS
Chapter 7. Intrusion detection for CPS
Chapter 8. Key management in CPS
Chapter 9. Legacy CPS system protection
Chapter 10. Lightweight crypto and security
Chapter 11. Threat modeling for CPS
Chapter 12. Vulnerability analysis for CPS
Part II: Application Domains
Chapter 13. Energy
Chapter 14. Medical
Chapter 15. Transportation
Chapter 16. Physical Infrastructure
Chapter 17. Manufacturing
Chapter 18. Building
Chapter 19. Agriculture
Chapter 20. Robotics
Chapter 21. Unmanned Aerial Vehicles
Chapter 22. Smart Cities
Editors:
Houbing Song, West Virginia University, USA (Houbing.Song@mail.wvu.edu)
Glenn A. Fink, Pacific Northwest National Laboratory, USA (Glenn.Fink@pnnl.gov)
Sabina Jeschke, RWTH Aachen University, Germany (sabina.jeschke@ima-zlw-ifu.rwth-aachen.de)
Gilad L. Rosner, Internet of Things Privacy Forum, UK (gilad@giladrosner.com)

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
SEFM 2022   20th International Conference on Software Engineering and Formal Methods
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
IJGTT 2022   International Journal of Game Theory and Technology
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
EEIEJ 2022   Emerging Trends in Electrical, Electronics & Instrumentation Engineering: An international Journal