<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:"Yu Gothic";
panose-1:2 11 4 0 0 0 0 0 0 0;}
@font-face
{font-family:"Yu Gothic";
panose-1:2 11 4 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0mm;
margin-bottom:.0001pt;
text-align:justify;
text-justify:inter-ideograph;
font-size:10.5pt;
font-family:"Yu Gothic";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.17
{mso-style-type:personal-compose;
font-family:"Yu Gothic";
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Yu Gothic";}
/* Page Definitions */
@page WordSection1
{size:612.0pt 792.0pt;
margin:99.25pt 30.0mm 30.0mm 30.0mm;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026">
<v:textbox inset="5.85pt,.7pt,5.85pt,.7pt" />
</o:shapedefaults></xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=JA link="#0563C1" vlink="#954F72" style='text-justify-trim:punctuation'><div class=WordSection1><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Dear All,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>We are pleased to announce that the submission deadline has been extended to October 19.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Please consider submitting to the special issue of International Journal of Information Security on "IoT Security and Privacy".<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Please find the details described below.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>We look forward to your submissions!<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Best regards,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Guest Editors<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Call for Papers<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>---------------<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Springer International Journal of Information Security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Special Issue on “IoT Security and Privacy”<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>https://ijis-si-iotsec.github.io/<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>https://link.springer.com/journal/10207<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>The Internet is gradually transforming from a communication platform for<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>conventional IT appliances into the Internet of Things (IoT),<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>increasingly interconnecting many assorted devices and sensors. These<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>devices are generally referred as IoT devices, and many of them are<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>inexpensive and can be constrained in terms of energy, bandwidth and<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>memory. The establishment of IoT ecosystems in various domains is<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>bringing multiple benefits to human users and companies alike. Example<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>of such domains include Smart Homes, Smart Cities, the Industrial<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Internet and even Intelligent Transportation Systems. However, the IoT<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>as a whole – including related paradigms such as Machine-to-Machine<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>(M2M) and Cyber-Physical Systems (CPS) – is susceptible to a multitude<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>of threats. In fact, many IoT devices currently are insecure and have<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>many security vulnerabilities. For example, many vulnerable IoT devices<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>which have been infected with malware have subsequently become comprised<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>into large botnets, resulting in devastating DDOS attacks. Consequently,<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>ensuring the security of such IoT ecosystems – before, during, and after<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>an attack takes place – is a crucial issue for our society at this moment.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>This special issue aims to collect contributions by leading-edge<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>researchers from academia and industry, show the latest research results<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>in the field of IoT security and privacy, and provide valuable<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>information to researchers as well as practitioners, standards<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>developers and policymakers. Its aim is to focus on the research<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>challenges and issues in IoT security. Manuscripts regarding novel<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>algorithms, architectures, implementations, and experiences are welcome.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Topics include but are not limited to:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Secure protocols for IoT devices<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Privacy solutions and privacy helpers for IoT environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Trust frameworks and secure/private collaboration mechanisms for IoT<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Secure management and self-healing for IoT environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Operative systems security for IoT devices<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Security diagnosis tools for IoT devices<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Threat and vulnerability detection in IoT environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Anomaly detection and prevention mechanisms in IoT networks<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Case studies of malware analysis in IoT environments<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* IoT forensics and digital evidence<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Testbeds and experimental facilities for IoT security analysis and<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>research<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Standardization activities for IoT security<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>* Security and privacy solutions tailored to specific IoT domains and<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>ecosystems<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Submission Guidelines<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>-----------------------<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Authors should prepare their manuscripts according to the “Instructions<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>for Authors” guidelines outlined at the journal website:<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>http://www.springer.com/computer/security+and+cryptology/journal/10207<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Note that the journal sets no page limit, although we encourage authors<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>to keep their submissions to a length that’s in the ballpark of the<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>accepted articles (unless there are special reasons to submit something<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>longer), i.e., less than 30 pages, in order to expedite the review process.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>All papers will be peer-reviewed, by following a regular reviewing<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>procedure.<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Guest Editors<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>---------------<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Takeshi Takahashi, National Institute of Information and Communications Technology, Japan<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Rodrigo Roman Castro, Universidad de Málaga, Spain<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Ryan Ko, University of Waikato, New Zealand<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Bilhanan Silverajan, Tampere University of Technology, Finland<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>Said Tabet, EMC Corporation, USA<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'>(Guest Editors of the special issue of International Journal of Information Security on "IoT Security and Privacy")<o:p></o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US style='font-size:11.0pt'><o:p> </o:p></span></p></div></body></html>