<div dir="ltr"><b>Call for Chapters: Security and Privacy Solutions for the Internet of Energy<br clear="all"></b><div><span style="color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px">Full Chapters Due: January 20, 2020</span><br style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"></div><div><a href="https://www.igi-global.com/publish/call-for-papers/call-details/4436">https://www.igi-global.com/publish/call-for-papers/call-details/4436</a> </div><div><br></div><div class="gmail-row" style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><div class="gmail-col-md-12" style="box-sizing:border-box;min-height:1px;padding-right:15px;padding-left:15px;float:left;width:877.5px"><div id="gmail-ctl00_ctl00_cphMain_cphSection_pnlIntroduction" style="box-sizing:border-box"><h2 style="box-sizing:border-box;font-family:Tahoma,"Trebuchet MS";font-weight:normal;line-height:1.1;margin:30px 0px 7px;font-size:20px">Introduction</h2><div class="gmail-headerdivider" style="box-sizing:border-box;height:1px;width:847.5px;background-color:rgb(218,218,218);margin:3px 0px 5px"></div><span id="gmail-ctl00_ctl00_cphMain_cphSection_lblIntroduction" style="box-sizing:border-box">Electrical energy storage is a key of modern and future life. The consumption of electrical energy (i.e. the use of air conditioning, audio and video devices or electric heating) is increasing every year due; firstly, to the increase of the population and secondly by the appearance of new form of consumption, such as electric cars. The dilemma with this increase consumption is, how to ensure the balance between supply and demand for electricity at all times? To address this problem, the idea of placing the new generation of Internet of Energy to control this energy has appeared in recent literature in different flavors in order to provide electric power supply secure, sustainable and competitive to consumers. In addition, the revolution on the Internet of Energy involves a significant change inside of the consumer where consumers will also become a producer with the ability of energy storage such as in the vehicle battery, or as local generation sources such as photovoltaic panels.<br style="box-sizing:border-box">The main problem in the development of the Internet of Energy is not located at the physical medium but mainly in the delivery of reliability and security. The possibility of fitting with active or passive attacks on the Internet of Energy network is great to divulge privacy and disrupt energy (e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack, Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary Attack, Routing Table Overflow Attack etc.). Therefore, the security requirements, including authentication, accountability, integrity, non-repudiation, access control and confidentiality should be paid more attention in the future for high-performance Internet of Energy.<br style="box-sizing:border-box"><br style="box-sizing:border-box">The main problem in the development of a smart grid is not located at the physical medium but mainly in the delivery of reliability and security. The possibility of fitting with active or passive attacks in smart grid network is great to divulge privacy and disrupt energy (e.g. Wormhole Attack, False Data Injection Attack, Black Hole Attack, Grey Hole Attack, DoS Attack, Physical Layer Attack, Colluding Adversary Attack, Routing Table Overflow Attack, etc.). Therefore, the security requirements, including authentication, accountability, integrity, non-repudiation, access control, and confidentiality should be paid more attention in the future for high-performance smart grids</span><br style="box-sizing:border-box"><br style="box-sizing:border-box"></div></div></div><div class="gmail-row" style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><div class="gmail-col-md-12" style="box-sizing:border-box;min-height:1px;padding-right:15px;padding-left:15px;float:left;width:877.5px"><div id="gmail-ctl00_ctl00_cphMain_cphSection_pnlObjective" style="box-sizing:border-box"><h2 style="box-sizing:border-box;font-family:Tahoma,"Trebuchet MS";font-weight:normal;line-height:1.1;margin:30px 0px 7px;font-size:20px">Objective</h2><div class="gmail-headerdivider" style="box-sizing:border-box;height:1px;width:847.5px;background-color:rgb(218,218,218);margin:3px 0px 5px"></div><span id="gmail-ctl00_ctl00_cphMain_cphSection_lblObjective" style="box-sizing:border-box">This book will cover the current scope of various methodologies and mechanisms in the theory and practice of security, privacy, intrusion detection, and applied cryptography for the Internet of Energy.</span><br style="box-sizing:border-box"><br style="box-sizing:border-box"></div></div></div><div class="gmail-row" style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><div class="gmail-col-md-12" style="box-sizing:border-box;min-height:1px;padding-right:15px;padding-left:15px;float:left;width:877.5px"><div id="gmail-ctl00_ctl00_cphMain_cphSection_pnlTargetAudience" style="box-sizing:border-box"><h2 style="box-sizing:border-box;font-family:Tahoma,"Trebuchet MS";font-weight:normal;line-height:1.1;margin:30px 0px 7px;font-size:20px">Target Audience</h2><div class="gmail-headerdivider" style="box-sizing:border-box;height:1px;width:847.5px;background-color:rgb(218,218,218);margin:3px 0px 5px"></div><span id="gmail-ctl00_ctl00_cphMain_cphSection_lblTargetAudience" style="box-sizing:border-box">The target audience of this book will be composed of professionals and researchers working in the field of security and privacy.</span><br style="box-sizing:border-box"><br style="box-sizing:border-box"></div></div></div><div class="gmail-row" style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><div class="gmail-col-md-12" style="box-sizing:border-box;min-height:1px;padding-right:15px;padding-left:15px;float:left;width:877.5px"><div id="gmail-ctl00_ctl00_cphMain_cphSection_pnlRecommendedTopics" style="box-sizing:border-box"><h2 style="box-sizing:border-box;font-family:Tahoma,"Trebuchet MS";font-weight:normal;line-height:1.1;margin:30px 0px 7px;font-size:20px">Recommended Topics</h2><div class="gmail-headerdivider" style="box-sizing:border-box;height:1px;width:847.5px;background-color:rgb(218,218,218);margin:3px 0px 5px"></div><span id="gmail-ctl00_ctl00_cphMain_cphSection_lblRecommendedTopics" style="box-sizing:border-box">• Threat models and attack strategies for Internet of Energy<br style="box-sizing:border-box">• Security and privacy in Internet of Energy with AI<br style="box-sizing:border-box">• Identification and biometrics in Internet of Energy<br style="box-sizing:border-box">• Security and privacy in cloud/fog/edge computing<br style="box-sizing:border-box">• Trust management architectures<br style="box-sizing:border-box">• Security and privacy in cooperative machine learning<br style="box-sizing:border-box">• Security architectures and protection mechanisms for Internet of Energy<br style="box-sizing:border-box">• Security applications and management of Internet of Energy<br style="box-sizing:border-box">• Security of Big Data in Internet of Energy<br style="box-sizing:border-box">• Intrusion and malware detection/prevention technologies for Internet of Energy<br style="box-sizing:border-box">• Security of Cyber physical Internet of Energy systems<br style="box-sizing:border-box">• Models for risk identification and assessment in Internet of Energy networks<br style="box-sizing:border-box">• Lightweight cryptographic algorithms and protocols</span><br style="box-sizing:border-box"><br style="box-sizing:border-box"></div></div></div><div class="gmail-row" style="box-sizing:border-box;color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><div class="gmail-col-md-12" style="box-sizing:border-box;min-height:1px;padding-right:15px;padding-left:15px;float:left;width:877.5px"><div id="gmail-ctl00_ctl00_cphMain_cphSection_pnlSubmissionProcedure" style="box-sizing:border-box"><h2 style="box-sizing:border-box;font-family:Tahoma,"Trebuchet MS";font-weight:normal;line-height:1.1;margin:30px 0px 7px;font-size:20px">Submission Procedure</h2><div class="gmail-headerdivider" style="box-sizing:border-box;height:1px;width:847.5px;background-color:rgb(218,218,218);margin:3px 0px 5px"></div><span id="gmail-ctl00_ctl00_cphMain_cphSection_lblSubmissionProcedure" style="box-sizing:border-box">Researchers and practitioners are invited to submit on or before <b style="box-sizing:border-box">November 15, 2019</b> a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by <b style="box-sizing:border-box">November 29, 2019</b> about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by <b style="box-sizing:border-box">January 20, 2020</b>, and all interested authors must consult the guidelines for manuscript submissions at <a href="http://www.igi-global.com/publish/contributor-resources/before-you-write/" style="box-sizing:border-box;background-color:transparent;color:rgb(51,102,204);text-decoration-line:none">http://www.igi-global.com/publish/contributor-resources/before-you-write/ </a>prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.<br style="box-sizing:border-box">Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Security and Privacy Solutions for the Internet of Energy. All manuscripts are accepted based on a double-blind peer review editorial process. </span>All proposals should be submitted through the eEditorial Discovery®TM online submission manager.<span style="font-family:Arial,Helvetica,sans-serif;font-size:small;color:rgb(34,34,34)"> </span></div></div></div><div><span style="color:rgb(51,51,51);font-family:Arial,Verdana,Helvetica,sans-serif;font-size:12px"><br></span></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div style="text-align:left"><span style="line-height:16px;white-space:nowrap;color:rgb(51,51,51);font-family:arial,helvetica,sans-serif;font-size:small">_________________________________________________________________________</span><br></div><div style="text-align:left"><div><font color="#333333" size="2" face="arial, helvetica, sans-serif"><span style="line-height:16px;white-space:nowrap"><b>Dr. Mohamed Amine Ferrag</b></span></font></div><div><font color="#333333" face="arial, helvetica, sans-serif"><span style="white-space:nowrap">Senior Lecturer Class A</span></font></div><div><span style="white-space:nowrap;color:rgb(51,51,51);font-family:arial,helvetica,sans-serif">Department of Computer Science</span></div><div><font face="arial, helvetica, sans-serif" size="2"><font color="#333333"><span style="line-height:16px;white-space:nowrap">Guelma University, </span></font><span style="white-space:nowrap;color:rgb(51,51,51)">BP 401 Guelma 24000, Algeria</span></font></div><div><font color="#333333" face="arial, helvetica, sans-serif" size="2"><span style="line-height:16px;white-space:nowrap">Tel. : </span><span style="white-space:nowrap">+213 661 87 30 51</span></font></div><div><font color="#333333" face="arial, helvetica, sans-serif" size="2"><span style="line-height:16px;white-space:nowrap">E-mails: <a href="mailto:mohamed.amine.ferrag@gmail.com" target="_blank">mohamed.amine.ferrag@gmail.com</a> /  </span><span style="white-space:nowrap"><a href="mailto:ferrag.mohamedamine@univ-guelma.dz" target="_blank">ferrag.mohamedamine@univ-guelma.dz</a></span></font></div><div><font face="arial, helvetica, sans-serif" size="2"><span style="line-height:16px;white-space:nowrap"><font color="#333333">Homepage : </font><a href="https://sites.google.com/site/mohamedamineferrag/" target="_blank"><font color="#0000ff">https://sites.google.com/site/mohamedamineferrag/<br></font></a></span></font></div><div><div style="font-size:12.8px"></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>