<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div><b class=""><span style="font-size:10.0pt;line-height:
115%;font-family:"Calibri",sans-serif;mso-fareast-font-family:SimSun;
mso-bidi-language:EN-US" class="">Special issue on </span></b><b class=""><span style="font-size:10.0pt;line-height:115%;mso-bidi-font-family:
Calibri" class="">S</span></b><b class=""><span style="font-size:10.0pt;line-height:115%;mso-fareast-font-family:SimSun;
mso-bidi-font-family:Calibri;mso-bidi-language:EN-US" class="">ecurity </span></b><b class=""><span style="font-size:10.0pt;line-height:
115%;mso-bidi-font-family:Calibri" class="">and Privacy in Smart Cyber-physical S</span></b><b class=""><span style="font-size:10.0pt;line-height:
115%;mso-fareast-font-family:SimSun;mso-bidi-font-family:Calibri;mso-bidi-language:
EN-US" class="">ystems</span></b><b class=""><span style="font-size:10.0pt;line-height:115%;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">- Computers &
Security</span></b><b class=""><span style="font-size:10.0pt;line-height:115%;mso-bidi-font-family:Calibri" class="">,
Elsevier</span></b><br class=""><div class=""><div style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""><br class="">
Computers & Security welcomes submissions to the special issue on </span><span style="font-size:10.0pt;mso-bidi-font-family:Calibri" class="">S</span><span style="font-size:10.0pt;mso-fareast-font-family:SimSun;mso-bidi-font-family:
Calibri;mso-bidi-language:EN-US" class="">ecurity </span><span style="font-size:10.0pt;
mso-bidi-font-family:Calibri" class="">and Privacy in Smart Cyber-physical S</span><span style="font-size:10.0pt;mso-fareast-font-family:SimSun;mso-bidi-font-family:
Calibri;mso-bidi-language:EN-US" class="">ystems<o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;mso-bidi-font-family:Calibri" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><b class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;mso-fareast-font-family:
SimSun;mso-bidi-language:EN-US" class="">Overview:<o:p class=""></o:p></span></b></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Smart Cyber-physical
systems such as smart vehicles, smart grid, smart healthcare systems, and smart
homes collect data from their environment and communicating systems and use the
knowledge they derive from the data and/or the raw data to adjust their behaviors.
The impacts of attacks on these systems combined with the frequent
identification of new vulnerability types and the non-determinism of the
behaviors of these systems make them high target to malicious intents. In
addition, the devices collect extensive amount of private data that could be
used for purposes other than the ones expected by their owners.  <o:p class=""></o:p></span></p><div style="margin-left: 0.5in; text-align: justify;" class=""><span style="font-size:9.0pt;mso-bidi-font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-bidi-font-family:Arial;color:blue;mso-ansi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">The objective of this
special issue is to collect and report on recent high-quality research that
addresses different problems related to the security and privacy in
cyber-physical systems. High quality contributions addressing related
theoretical and practical aspects are expected. <o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Potential topics
include but are not limited to:</span><span style="font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;mso-fareast-font-family:
SimSun;mso-bidi-language:EN-US" class=""><o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpFirst" style="margin-left:.25in;mso-add-space:auto;
text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Security protocols for
smart cyber-physical systems<o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpMiddle" style="margin-left:.25in;mso-add-space:
auto;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Secure data analytics
for smart cyber-physical systems<o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpMiddle" style="margin-left:.25in;mso-add-space:
auto;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Intrusion detection and
resiliency for cyber-physical systems<o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpMiddle" style="margin-left:.25in;mso-add-space:
auto;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Secure development of
cyber-physical systems<o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpMiddle" style="margin-left:.25in;mso-add-space:
auto;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Privacy-enhanced
technologies for smart cyber-physical systems<o:p class=""></o:p></span></p><p class="MsoListParagraphCxSpMiddle" style="margin-left:.25in;mso-add-space:
auto;text-indent:-.25in;mso-list:l0 level1 lfo1"><!--[if !supportLists]--><span style="font-size:10.0pt;font-family:Symbol;mso-fareast-font-family:Symbol;
mso-bidi-font-family:Symbol;mso-bidi-language:EN-US" class="">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";" class="">      
</span></span><!--[endif]--><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">The relation of
security and safety for smart cyber-physical systems<o:p class=""></o:p></span></p><div style="margin-left: 0.25in;" class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;mso-fareast-font-family:
SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><b class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Paper Solicitation:<o:p class=""></o:p></span></b></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">The special issue is
open to all the researchers, developers and industry experts who wish to
contribute by submitting a relevant research manuscript.<o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><b class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Instructions for
Authors:</span></b><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> <o:p class=""></o:p></span></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">The submission must not
be under consideration for publication elsewhere. Extended conference papers
will only be considered if the paper is substantially extended with at least
30% new and original contributions. The new contributions must be clearly stated
in the cover letter when the paper is submitted. <o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">All the papers will be
peer-reviewed following the COSE reviewing procedures. Authors should select
" VSI: smart CPS" when they reach the "Article Type" step
in the submission process.<o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><b class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Important Dates:</span></b><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;mso-fareast-font-family:
SimSun;mso-bidi-language:EN-US" class=""><o:p class=""></o:p></span></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">• Submission deadline: 30
November 2018<br class="">
• Authors’ notification: 31 January 2019<br class="">
• Revisions due: 30 April 2019<br class="">
• Final decision: 30 June 2019<br class="">
• Camera ready version due: 30 September 2019<br class="">
• Tentative publication date: Late 2019<o:p class=""></o:p></span></p><div class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""> </span><br class="webkit-block-placeholder"></div><p class="MsoNormal"><b class=""><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Guest Editors:<o:p class=""></o:p></span></b></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class=""><br class="">
Lotfi ben Othmane, Iowa State University, USA <o:p class=""></o:p></span></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Doug Jacobson Iowa
State University, USA <o:p class=""></o:p></span></p><p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Calibri",sans-serif;
mso-fareast-font-family:SimSun;mso-bidi-language:EN-US" class="">Edgar Weippl, SBA
Research, Austria<o:p class=""></o:p></span></p>

<!--EndFragment--><div class=""><br class="Apple-interchange-newline">
</div>

<br class=""></div></div></div><br class=""></body></html>