posted by user: schunter || 6834 views || tracked by 13 users: [display]

Journal of Computer Networks 2018 : Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks

FacebookTwitterLinkedInGoogle

Link: https://www.journals.elsevier.com/computer-networks/call-for-papers/special-issue-security-privacy-internet-of-things
 
When Dec 1, 2018 - Dec 2, 2018
Where Journal
Submission Deadline Aug 6, 2018
Notification Due Sep 15, 2018
Final Version Due Oct 15, 2018
Categories    security   internet of things   privacy
 

Call For Papers

Special Issue: Security and Privacy for the Internet of Things

Elsevier Journal of Computer Networks
- The International Journal of Computer and Telecommunications Networking
________________________________________
Scope

The Internet of Things (IoT) is rapidly evolving from theory to real-life and large scale deployments. Examples include smart homes, industrial manufacturing, distributed sensing and tracking for logistics, and monitoring for transportation systems. While some IoT devices today provide basic security protection, security and privacy is very often centralized in the cloud and proprietary. Furthermore, large numbers of insecure devices can be integrated in a botnet and used to run denial of service attacks.
To foster trust, the myriad of IoT devices IoT have to be designed and built with security and privacy in mind. As devices become smaller and may only use a limited amount of energy, guaranteeing security becomes a difficult task. Furthermore, the role the edge plays in protecting and scaling IoT devices is largely unclear.
This special issue is devoted to all aspects of IoT security and privacy, addressing the threats posed by the widespread use of the IoT.

Topics of interest include, but are not limited to:
• Security and privacy solutions for the IoT
• Secure and privacy-enhancing protocols for the IoT
• Distributed security for the cloud, the edge, and IoT devices
• Mitigation of security risks posed by large numbers of insecure devices.
• “Successful” attack instances in today’s IoT and proposed mitigations
• Threat models and attack strategies in the IoT
• Malware and intrusion detection for the IoT
• Trust and collaboration among IoT devices
• Security management that supports scalable IoT security
• Self-healing and attack resilience for the IoT
• Industrial case studies and best practices including large-scale IoT test beds
• Embedded security and hardware security mechanism for protecting the IoT

________________________________________
Submission, Review, and Selection

Submitted articles must be original, unpublished, and not currently under review by other journals. Submitted articles must be written clearly, in good English, and should not exceed 20 pages (double-spaced). If a preliminary version of the paper was published in conference proceedings, the authors must clearly state this during the submission and the submitted manuscript must be a substantial extension of the earlier manuscript. In this case, the authors are also required to clearly explain the enhancements made in the journal version.
Manuscripts should be submitted online through the Elsevier Editorial System http://ees.elsevier.com/comnet/ and authors should select “IoT Security” as the article type for submission.
Each submission will undergo a quick evaluation of its fit to the call, then a conference-style review by the members of the program committee, and a first feedback to authors with rejection, acceptance, or revision decision. If required, we plan shepherding papers that are conditionally accepted. The reviewers will check revised versions and a final decision will be made.

________________________________________
Important dates:
• Deadline for submission: August 06, 2018
• Feedback to authors: September 15, 2018
• Final version: October 15 2018
• Final decision: November 01 2018

________________________________________
Editorial Board
• David Barrera (Polytechnique Montreal)
• Frank Piessens (KU Leuven)
• Hsu-Chun Hsiao (National Taiwan University)
• Kapil Singh (IBM Research)
• Mauro Conti (University of Padua)
• Nils Ole Tippenhauer (Singapore University)
• Nuno Neves (Universidade de Lisboa)
• Rodrigo Roman (Univ. Malaga)
• Samuel Marchal (Aalto University)
• Yier Jin (Univ. Florida)

Guest Editors:
• Andreas Wespi, IBM Zurich Research Laboratory, Switzerland
• Matthias Schunter, Intel Labs, Germany

Related Resources

CCBDIOT 2024   2024 3rd International Conference on Computing, Big Data and Internet of Things (CCBDIOT 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
BDPC--EI 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
No Hat 2024   No Hat - COMPUTER SECURITY CONFERENCE
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
ICIT 2024   ACM--2024 The 12th International Conference on Information Technology: IoT and Smart City (ICIT 2024)