<div dir="ltr"><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><b><span lang="EN-US" style="font-size:12pt;font-family:"Times New Roman",serif">CALL FOR PAPERS</span></b></p><p class="MsoNormal" align="center" style="margin:0in 0in 10pt;text-align:center;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><b><span lang="EN-US" style="font-size:14pt;font-family:"Times New Roman",serif"> Special Issue on ‘</span></b><b><span lang="EN-US" style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(33,37,41);text-transform:uppercase">NEXT GENERATION SECURITY AND PRIVACY INSPIRING INTELLIGENT AND LEARNING TECHNOLOGIES</span></b><b><span lang="EN-US" style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(33,37,41)">’</span></b></p><p class="MsoNormal" align="center" style="margin:0in 0in 10pt;text-align:center;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><a href="https://wol-prod-cdn.literatumonline.com/pb-assets/assets/24756725/NEXT%20GENERATION%20SECURITY%20AND%20PRIVACY%20INSPIRING%20INTELLIGENT%20AND%20LEARNING%20TECHNOLOGIES%20030619-1559555521247.pdf" target="_blank">https://wol-prod-cdn.literatumonline.com/pb-assets/assets/24756725/NEXT%20GENERATION%20SECURITY%20AND%20PRIVACY%20INSPIRING%20INTELLIGENT%20AND%20LEARNING%20TECHNOLOGIES%20030619-1559555521247.pdf</a>  <b><span lang="EN-US" style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(33,37,41)"><br></span></b></p><p class="MsoNormal" style="margin:0in 0in 6pt;text-align:justify;text-indent:0.25in;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Intelligent technologies represent a remarkable transformation for smart cities. Such technologies have enhanced the quality and performance of urban and sub-urban services, including transport, energy, healthcare and traffic. With today’s advancements in Artificial Intelligence (AI), user-specific service availability and delivery has been made readily available at reduced costs. As smart cities continue to deploy such intelligent and learning technologies to improve the performance and diversity of smart city services, one of the main issues that prevails is efficient and reliable security and privacy towards both the infrastructure and users. The hype surrounding 5G and AI is already forcing companies to quickly upgrade their current solutions, tools, and technology to accommodate massive data volumes. However, the large-scale deployment of 5G, Cloud, Fog and Mobile Edge Computing (MEC) will bring new challenges; security and privacy are some examples.</span></p><p class="MsoNormal" style="margin:0in 0in 6pt;text-align:justify;text-indent:0.25in;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">AI and machine learning provide a mechanism to automate the creation of analytical models in order to enable algorithms to learn continuously. This is achieved with the aid of the ever-growing smart city data. Continuously evolving successful models and solutions reduces the need for human involvement and interaction. These evolved models can be used to produce reliable and repeatable decisions autonomously. Such models are now being used in intelligent and autonomously-run smart vehicles. The advent of such new learning solutions leads to more security, privacy and cryptographic challenges.      </span></p><p class="MsoNormal" style="margin:0in 0in 6pt;text-align:justify;text-indent:0.25in;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">This special issue intends to explore and address the important issues and challenges related to the security and privacy for intelligent and learning technologies. The objective is to explore the potentials of machine learning and big data analytics to provide advanced solutions for integration within the smart city architecture. We believe that machine learning and big data analytics will play a vital role in providing enhanced security for intelligent autonomous smart city solutions and enables organizations to make crucial changes to their security landscape. Topics of interest include, but are not limited to, the following: </span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpFirst" style="margin:0in 0in 0.0001pt 0.75in;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Security and privacy architectures for smart cities.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Machine learning and big data analytics architectures for smart city security and privacy.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Data confidentiality and privacy in smart cities.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Using fog and MEC architectures to provide secure and reliable communication.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Providing secure and reliable Next Generation Networks.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Block chain solutions for next generation security and privacy.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Machine learning based security detecting protocols.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpMiddle" style="margin:0in 0in 0.0001pt 0.75in;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Secure fog, edge and cloud solutions.</span></p><p class="gmail-m_3781766028852555594gmail-m_-5242511519026717681gmail-MsoListParagraphCxSpLast" style="margin:0in 0in 0.0001pt 0.75in;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:Symbol;color:rgb(33,37,41)">·<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">        </span></span><span dir="LTR"></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Intrusion detection and prevention using intelligent and learning techniques</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"> </span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Instructions for Manuscripts</span></b></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Submitted articles must describe original research which have not been published or currently under review by other journals or conferences. Submissions must be directly sent via the Security and Privacy submission website at </span><span lang="EN-US"><a href="https://mc.manuscriptcentral.com/sphs" target="_blank" style="color:blue"><span style="font-family:"Times New Roman",serif">https://mc.manuscriptcentral.com/sphs</span></a></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">. Select ‘Special Issue’ as the manuscript type and then, from the dropdown list, please select ‘Security and Privacy in Smart Communities’. Submissions must conform to the layout and format guidelines for the journal: </span><span lang="EN-US"><a href="http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2475-6725/homepage/ForAuthors.html" target="_blank" style="color:blue"><span style="font-family:"Times New Roman",serif">http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2475-6725/homepage/ForAuthors.html</span></a></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"> </span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><b><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Important Dates</span></b></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Manuscript Due: September 31, 2019</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Decision Notification: November 31, 2019</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Final Manuscript Due: December 30, 2019</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Tentative Publication Date: 3rd Quarter of 2020</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"> </span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"> </span><b style="font-size:11pt"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Guest Editors</span></b></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"><b>Dr. Ismaeel Al Ridhawi</b>, University of Ottawa, Ottawa, ON, Canada. </span><span lang="EN-US"><span style="color:blue;font-family:"Times New Roman",serif"><a href="mailto:Ismaeel.AlRidhawi@uottawa.ca" target="_blank" style="color:blue">Ismaeel.AlRidhawi@uottawa.ca</a></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"><b>Dr. Omar Alfandi</b>, Zayed University, United Arab Emirates and Georg-August-University Goettingen, Germany. </span><span lang="EN-US"><a href="mailto:Omar.alfandi@zu.ac.ae" target="_blank" style="color:blue"><span style="font-family:"Times New Roman",serif">Omar.alfandi@zu.ac.ae</span></a></span><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)"></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><b style="font-size:11pt"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Prof. </span></b><b style="font-size:11pt"><span lang="EN-US" style="font-family:"Times New Roman",serif;color:rgb(33,37,41)">Jalel Ben Othman</span></b><span lang="EN-US" style="font-size:11pt;font-family:"Times New Roman",serif;color:rgb(33,37,41)">, L2S lab CNRS Centrale Supelec, University Paris Sud and University of Paris 13, France, </span><span lang="EN-US" style="font-size:11pt"><span style="color:blue;font-family:"Times New Roman",serif"><a href="mailto:jbo@l2s.centralesupelec" target="_blank" style="color:blue">jbo@l2s.centralesupelec.fr</a></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial;font-size:11pt;font-family:Calibri,sans-serif"><span lang="EN-US" style="color:rgb(33,37,41);font-family:"Times New Roman",serif;font-size:11pt"><b>Dr. Moayad Aloqaily</b>, Gnowit Inc., Ottawa, ON, Canada. </span><span lang="EN-US" style="font-size:11pt"><a href="mailto:Moayad@gnowit.com" target="_blank" style="color:blue"><span style="font-family:"Times New Roman",serif">Moayad@gnowit.com</span></a></span><span style="color:rgb(33,37,41);font-family:"Times New Roman",serif;font-size:11pt">  </span></p></div>