<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p class="MsoNormal">
<style>
<!--
/* Font Definitions */
@font-face
{font-family:Arial;
panose-1:2 11 6 4 2 2 2 2 2 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:"MS 明朝";
mso-font-charset:78;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:1 0 16778247 0 131072 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin:0cm;
margin-bottom:.0001pt;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:Arial;
mso-fareast-font-family:"MS 明朝";
mso-fareast-theme-font:minor-fareast;
mso-bidi-font-family:Arial;
color:black;
mso-ansi-language:EN;
mso-fareast-language:ES;}
@page Section1
{size:612.0pt 792.0pt;
margin:72.0pt 90.0pt 72.0pt 90.0pt;
mso-header-margin:36.0pt;
mso-footer-margin:36.0pt;
mso-paper-source:0;}
div.Section1
{page:Section1;}
--</style><span style="font-size:10.0pt;line-height:115%" lang="EN">Dear
All,</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"> </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Please
consider submitting to the special issue of International
Journal of
Information Security on "IoT Security and Privacy".</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Please
find the details described below.</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"> </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Submission
deadline is October 1, 2018.</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"> </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">We
look forward to your submissions!</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"> </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Best
regards,</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"> </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Takeshi
Takahashi, National Institute of Information and Communications
Technology,
Japan</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%;
mso-ansi-language:ES" lang="ES">Rodrigo Roman Castro,
Universidad de Málaga, Spain </span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Ryan
Ko, University of Waikato, New Zealand</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Bilhanan
Silverajan, Tampere University of Technology, Finland</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Said
Tabet, EMC Corporation, USA</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">(Guest
Editors of the special issue of International Journal of
Information Security
on "IoT Security and Privacy")</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"><br>
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"><br>
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN"><br>
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;line-height:115%"
lang="EN">Call for Papers<br>
---------------<br>
<br>
Springer International Journal of Information Security<br>
Special Issue on “IoT Security and Privacy”<br>
<br>
<a class="moz-txt-link-freetext" href="https://ijis-si-iotsec.github.io/">https://ijis-si-iotsec.github.io/</a><br>
<a class="moz-txt-link-freetext" href="https://link.springer.com/journal/10207">https://link.springer.com/journal/10207</a><br>
<br>
<br>
The Internet is gradually transforming from a communication
platform for conventional IT appliances into the Internet of
Things (IoT), increasingly interconnecting many assorted devices
and sensors. These devices are generally referred as IoT
devices, and many of them are inexpensive and can be constrained
in terms of energy, bandwidth and memory. The establishment of
IoT ecosystems in various domains is bringing multiple benefits
to human users and companies alike. Example of such domains
include Smart Homes, Smart Cities, the Industrial Internet and
even Intelligent Transportation Systems. However, the IoT as a
whole – including related paradigms such as Machine-to-Machine
(M2M) and Cyber-Physical Systems (CPS) – is susceptible to a
multitude of threats. In fact, many IoT devices currently are
insecure and have many security vulnerabilities. For example,
many vulnerable IoT devices which have been infected with
malware have subsequently become comprised into large botnets,
resulting in devastating DDOS attacks. Consequently, ensuring
the security of such IoT ecosystems – before, during, and after
an attack takes place – is a crucial issue for our society at
this moment.<br>
<br>
This special issue aims to collect contributions by leading-edge
researchers from academia and industry, show the latest research
results in the field of IoT security and privacy, and provide
valuable information to researchers as well as practitioners,
standards developers and policymakers. Its aim is to focus on
the research challenges and issues in IoT security. Manuscripts
regarding novel algorithms, architectures, implementations, and
experiences are welcome.<br>
<br>
Topics include but are not limited to:<br>
<br>
* Secure protocols for IoT devices<br>
* Privacy solutions and privacy helpers for IoT environments<br>
* Trust frameworks and secure/private collaboration mechanisms
for IoT environments<br>
* Secure management and self-healing for IoT environments<br>
* Operative systems security for IoT devices<br>
* Security diagnosis tools for IoT devices<br>
* Threat and vulnerability detection in IoT environments<br>
* Anomaly detection and prevention mechanisms in IoT networks<br>
* Case studies of malware analysis in IoT environments<br>
* IoT forensics and digital evidence<br>
* Testbeds and experimental facilities for IoT security analysis
and research<br>
* Standardization activities for IoT security<br>
* Security and privacy solutions tailored to specific IoT
domains and ecosystems<br>
<br>
<br>
Submission Guidelines<br>
-----------------------<br>
<br>
Authors should prepare their manuscripts according to the
“Instructions for Authors” guidelines outlined at the journal
website:
<a class="moz-txt-link-freetext" href="http://www.springer.com/computer/security+and+cryptology/journal/10207">http://www.springer.com/computer/security+and+cryptology/journal/10207</a><br>
<br>
Note that the journal sets no page limit, although we encourage
authors to keep their submissions to a length that’s in the
ballpark of the accepted articles (unless there are special
reasons to submit something longer), i.e., less than 30 pages,
in order to expedite the review process.<br>
<br>
All papers will be peer-reviewed, by following a regular
reviewing procedure.<br>
<br>
Authors are requested to submit their original manuscript via
the online submission system. Note that article type ‘S.I. : IOT
Security and Privacy’ must be selected on the system in order to
be considered for this special issue.<br>
<br>
<br>
Important Dates<br>
----------------<br>
<br>
Manuscript Due: October 1, 2018<br>
First Round of Reviews: December 3, 2018<br>
<br>
<br>
Guest Editors<br>
--------------<br>
<br>
Takeshi Takahashi, National Institute of Information and
Communications Technology, Japan<br>
Rodrigo Roman Castro, Universidad de Málaga, Spain<br>
Ryan Ko, University of Waikato, New Zealand<br>
Bilhanan Silverajan, Tampere University of Technology, Finland<br>
Said Tabet, Dell EMC, USA<br>
<br>
For more information, contact: editors-ijis-si-iotsec (at)
googlegroups dot com<br>
</span></p>
</body>
</html>