CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Kuan-Ching Li <[log in to unmask]>
Reply To:
Kuan-Ching Li <[log in to unmask]>
Date:
Sat, 10 Aug 2019 05:35:03 +0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (148 lines)
* Apologies if multiple copies of the cfp are received *

 ------------------------------
Call for Book Chapters
------------------------------

"Advances in Security, Privacy and Trust for Internet-of-Things (IoT)
and Cyber-Physical Systems (CPS) "
CRC Press, Taylor & Francis Group, USA
https://sites.google.com/site/advseciotcps/home
https://easychair.org/cfp/ADV1SEC


Important Dates
* Proposal Submission: September 20, 2019
* Proposal (Acceptance/Rejection): October 15, 2019 (no later than)
* Sample Chapter (Acceptance/Rejection): January 1, 2020
* Complete Chapter Submission (to editors): April 5, 2020
* Submission of Chapters (to publisher): April 15, 2020
* Publication Time: Q4/2020 (estimated)

Book Editors
Kuan-Ching Li, Providence University, Taiwan, [log in to unmask]
Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana,
India, [log in to unmask]
Dharma P. Agrawal, University of Cincinnati, Cincinnati, USA, [log in to unmask]


Internet of Things (IoT) and CPS (Cyber-Physical Systems) provide
mechanisms that are monitored and controlled by computing algorithms
that are tightly coupled among users and the Internet. That is, the
hardware and the software entities are intertwined and they typically
function on different time and location-based scales. Security,
privacy and trust in the Internet of Things (IoT) and CPS
(Cyber-Physical Systems) are different from conventional security.

Different security concerns revolve around the collection, aggregation
of data or transmission of data over the network. Analysis of
cyber-attack vectors and provision of appropriate mitigation
techniques are important research areas with respect to these systems.
Adoption of best practices and maintaining a balance between ease of
use and security are again crucial for the effective performance of
these systems.

This book will discuss, present techniques and methodologies as well
wide range of examples and illustrations to effectively show the
principles, algorithms, challenges, and applications of security,
privacy, and trust for IoT and CPS. It will be full of valuable
insights into security, privacy, and trust in IoT and CPS and will
cover most of the important security aspects and current trends that
are missed in other books. In addition, it will be an excellent
reference book to courses on security, privacy, and trust for IoT and
CPS. The material will prepare readers for exercising better
protection/defense in terms of understanding the motivation of
attackers and how to deal with as well to mitigate the situation in a
better manner.

Topics include, but are not limited to, the following:
- Fundamentals, Overviews, and Trends of Computer Networks and Cyber
Security
- Cyber risk, Cyber-crime, Cyber threat analysis, and modeling
- Cyber forensic tools, techniques, and analysis
- Security of cyber-physical cloud systems
- Cloud computing and services for cyber-physical systems
- Energy management for cyber-physical cloud systems.
- Real-time data analytics and data stream management for cyber-physical
systems
- Context-aware event processing for cyber-physical systems
- Security challenges in cyber-physical cloud systems
- Data virtualization and data-as-a-service in cyber-physical systems
- Cyber-physical cloud systems for smart city, smart energy grid
- Internet of Things and real-time cloud services
- Data-driven framework for cyber-physical systems
- Situational awareness in cyber-physical systems
- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery, and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security and privacy
- EV charging system security
- Intrusion detection for CPS
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- Security and privacy in industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security and privacy
- IoT-powered botnets
- iBeacon security and privacy
- Forensics on IoT devices
- HCI and security and privacy in IoT
- Mobile service privacy for IoT devices
- Reverse engineering and automated analysis of IoT malware
- Security and privacy in IoT operating systems and middleware
- IoT payment applications
- Standardization efforts related to IoT
- Testbeds and case studies for IoT
- Traffic monitoring and intrusion detection for IoT
- Virtualization solutions to IoT security
- Security and privacy for IoT-based smart cities
- Ethics, legal, and social considerations in IoT security
- Biometric modalities involved in IoT security
- Cyber attacks detection and prevention systems for IoT networks
- Cloud computing-based security solutions for IoT data
- Security and privacy issues in heterogeneous IoT
- Cloud of Things security and privacy issues
- Intrusion detection for IoT
- Trust Management for IoT
- Deep learning models for the service-centric Internet of things
- Deep Learning architectures for optimizing time series computational
data in IoTs
- Energy Efficient Machine Learning and Data Analytics Techniques in
IoT for Industry
- Multimedia data management in IoT
- Dynamic processes in IoT
- Security protocols in service-centric IoT
- Information revelation and privacy in IoT
- Dependable and Reliable IoT Analytics

Proposal submission
A proposal for book chapter is needed from prospective authors before
the proposal *submission due date*, describing the objective, scope,
and structure of the proposed chapter (no more than 5 pages).
Acceptance of chapter proposals will be communicated to lead chapter
authors after a formal double-blind review process, to ensure
relevance, quality, and originality. The submission of chapter
proposals should be processed via Easychair system
(https://easychair.org/conferences/?conf=adv1sec).

Additional Information
Inquiries and chapter proposal submissions can be forwarded
electronically by email, to:
Brij Gupta (email: [log in to unmask]), Kuan-Ching Li (email:
[log in to unmask]) and Dharma P. Agrawal (email: [log in to unmask])

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2