<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Georgia;
        panose-1:2 4 5 2 5 4 5 2 3 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Calibri",sans-serif;}
h1
        {mso-style-priority:9;
        mso-style-link:"Heading 1 Char";
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:24.0pt;
        font-family:"Calibri",sans-serif;
        font-weight:bold;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
        {mso-style-name:msonormal;
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.Heading1Char
        {mso-style-name:"Heading 1 Char";
        mso-style-priority:9;
        mso-style-link:"Heading 1";
        font-family:"Calibri Light";
        color:#2F5496;}
p.msochpdefault, li.msochpdefault, div.msochpdefault
        {mso-style-name:msochpdefault;
        mso-margin-top-alt:auto;
        margin-right:0in;
        mso-margin-bottom-alt:auto;
        margin-left:0in;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.emailstyle17
        {mso-style-name:emailstyle17;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
span.heading1char0
        {mso-style-name:heading1char;
        font-family:"Calibri",sans-serif;
        font-weight:bold;}
span.EmailStyle24
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<h1 style="vertical-align:baseline"><span style="font-family:"Georgia",serif;color:#222222;font-weight:normal">Special Issue on Risk and Security of Smart Systems</span><o:p></o:p></h1>
<p style="vertical-align:baseline"><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Smart systems are used currently to address social, economic, personal, and environmental issues, such as limited resources, climate change, and population
 ageing. For instance, they are used to address transportation, healthcare, energy, logistics, and manufacturing challenges.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">There is an important increase of cyber-security incidents on smart systems because they manage highly sensitive assets using complex system structures. These systems have large attack
 surfaces due to the high number of interconnections. Cyber security of smart systems must address deliberate attacks from disgruntled persons, espionage, terrorists, inadvertent compromises due to user errors, equipment and network failures, and natural disasters.
 In addition, there is an increase of sophisticated online attacks and growth of cybercrime that exploit the privacy of the users of these systems.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">The purpose of this special issue is to publish high-quality research and review articles that highlight start-of-the-art on analyzing the security and protecting smart systems.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Selected papers must contain original work that has neither been previously published nor is currently under review by another journal or conference. Previously published or accepted conference
 papers (including papers from CRiSIS 2019) must contain at least 30% new material to be considered for the special issue.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<strong><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Topics of interest</span></strong><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">We encourage the submission of high-quality contributions regarding the security and risk of smart systems. Topics of interest include but are not limited to following:</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Data anonymization for smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Data privacy and analytics for smart systems security,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Empirical methods for security of smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Forensics of smart systems security.</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Intrusion and malware detection/prevention technologies for smart systems</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Models for risk identification and assessment in smart systems</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">New emerging technologies for risk and security management of smart system</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Risk-aware access control for smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Risks metrics for smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Secure development of smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Security architectures for smart systems</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Security models and security policies for smart systems,</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Threat models and attack strategies for smart systems</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem 0px;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<strong><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Submission Guidelines</span></strong><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Authors should prepare their manuscript according to the guide for authors available from the online submission page of the Elsevier's Journal of Information Security and Applications
 (JISA) at <a href="http://www.journals.elsevier.com/journal-of-information-security-and-applications" target="_blank"><span style="color:#007398">http://www.journals.elsevier.com/journal-of-information-security-and-applications</span></a>.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Authors should select "SI: RSSS" when they reach the "Article Type" step in the submission process.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the corresponding guest editor.</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<strong><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Important Dates</span></strong><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Submission deadline: March 02, 2020</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Initial notification: June 15, 2020</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Submission deadline for revised papers: September 14, 2020</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Final acceptance/rejection notification: December 31, 2020</span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Publication: As per the policy of journal</span><o:p></o:p></p>
<p style="vertical-align:baseline;box-sizing:border-box;margin:1.5rem 0px;font-size:1.25rem;line-height:1.625rem;max-width:inherit">
<strong><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Guest Co-Editors</span></strong><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Dr. Slim Kallel, University of Sfax, Tunisia<br>
E-mail: <a href="mailto:slim.kallel@fsegs.usf.tn"><span style="color:#007398">slim.kallel@fsegs.usf.tn</span></a></span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Prof. Frederic Cuppens, IMT Atlantique, France<br>
Email: <a href="mailto:frederic.cuppens@imt-atlantique.fr"><span style="color:#007398">frederic.cuppens@imt-atlantique.fr</span></a></span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Prof. Nora Cuppens, IMT Atlantique, France<br>
Email: <a href="mailto:nora.cuppens@imt-atlantique.fr"><span style="color:#007398">nora.cuppens@imt-atlantique.fr</span></a></span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Prof. Ahmed Hadj Kacem, University of Sfax, Tunisia<br>
Email: <a href="mailto:ahmed.hadjkacecem@fsegs.usf.tn"><span style="color:#007398">ahmed.hadjkacecem@fsegs.usf.tn</span></a></span><o:p></o:p></p>
<p class="MsoNormal" style="text-indent:-.25in;vertical-align:baseline"><span style="font-size:10.0pt;font-family:Symbol;color:#505050">·</span><span style="font-size:7.0pt;font-family:"Times New Roman",serif;color:#505050">        
</span><span style="font-size:11.5pt;font-family:"Georgia",serif;color:#505050">Dr. Lotfi Ben-Othmane, IOWA State University, USA<br>
Email: <a href="mailto:othmanel@iastate.edu"><span style="color:#007398">othmanel@iastate.edu</span></a></span><o:p></o:p></p>
<p class="MsoNormal"><span style="font-size:11.0pt"> </span><o:p></o:p></p>
</div>
</body>
</html>