<div dir="ltr">
<div id="m_-8280431378760541573m_1426556963473112209gmail-:3v7" aria-label="Message Body" role="textbox" aria-multiline="true" style="direction:ltr;min-height:365px" aria-controls=":3xo" aria-expanded="false">



















<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>[Apologies if you got multiple copies of this
invitation]<span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:15.5pt;line-height:105%">The Third International Workshop on Advanced
Cybersecurity Applications in IoT and Beyond (<a name="m_-8280431378760541573_m_1426556963473112209__Hlk171295001">ACAIoT2024</a>)
<span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%;color:red">Hybrid Event</span><span style="font-size:12pt;line-height:105%"><span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><a href="https://iccns-conference.org/2024/Workshops/ACAIoT2024/" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:13.5pt;line-height:105%">https://iccns-conference.org/2024/Workshops/ACAIoT2024/</span></a><u><span style="font-size:13.5pt;line-height:105%;color:rgb(5,99,193)"><span></span></span></u></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%;color:black">24-27 Sept. 2024 | DUBROVNIK,
CROATIA.</span><span><span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%;color:red">Technically Co-Sponsored by IEEE
Croatia section </span><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:14pt;font-family:"Times New Roman",serif">ACAIoT2024 CFP:</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">ACAIoT will cover a range of topics crucial to
the intersection of cybersecurity and IoT, including but not limited to
advanced threat detection, blockchain applications in security, AI and machine
learning in cybersecurity, secure edge and cloud computing, and ethical hacking
techniques. The workshop aims to address the pressing security challenges faced
by IoT ecosystems and explore the potential of emerging technologies to foster
secure, resilient networks.:<span></span></span></p>

<ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">IoT Device and Firmware
     Security<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Malware and Firmware Analysis<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Resilience and Security
     Metrics<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Sensor Attacks, Detection,
     and Mitigations<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Healthcare and Public
     Services in IoT<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity for IoT Public
     Health Devices<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity in Power, Solar
     Chimneys, and Nuclear Units<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">IoT Management and Interfaces<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity Management in
     IoT Devices<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity in IoT Cloud
     and Web Interfaces<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity of Mobile
     Interface to IoT Devices<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Educational and
     Infrastructure Sectors<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity in IoT
     Education<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity Infrastructure
     for IoT Solutions<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity Applications
     for IoT Networks<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">IoT in Transport and Urban
     Environments<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity for Smart
     Vehicles and Transportation Domains<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity in Smart Homes
     and Smart Cities<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Cybersecurity in Drones and
     Aviation Systems<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Special Topics and
     Methodologies<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Calibri Light",sans-serif">Ethical Hacking for
     Diversified IoT Systems<span></span></span></li></ul>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Times New Roman",serif">  </span><b><u><span style="font-size:12pt;font-family:"Times New Roman",serif">Submissions Guidelines and Proceedings</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span>Manuscripts should
be prepared in 10-point font using the IEEE 8.5" x 11" two-column
format. All papers should be in PDF format, and submitted electronically at
Paper Submission Link. A full paper can be up to 6 pages (including all
figures, tables and references). Submitted papers must present original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines may be rejected
without review. Also submissions received after the due date, exceeding length
limit, or not appropriately structured may also not be considered. Authors may
contact the Program Chair for further information or clarification. All
submissions are peer-reviewed by at least three reviewers. Accepted papers will
appear in the ICCNS Proceeding, and be published by the IEEE Computer Society
Conference Publishing Services and be submitted to IEEE Xplore for inclusion. <br>
<br>
Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular papers
up to 8 pages and must follow the IEEE paper format. Please include up to 7
keywords, complete postal and email address, and fax and phone numbers of the
corresponding author. Authors of accepted papers are expected to present their
work at the conference. <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:13.5pt;line-height:105%;font-family:"Calibri Light",sans-serif;color:black">Important Dates:</span></u><span><span></span></span></p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc"><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Paper submission deadline: <span style="color:red">July 25, 2024 </span></span></b><span><span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Notification of acceptance:
     August 25, 2024 </span><span><span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Camera-ready Submission: September
     5, 2024</span><span><span></span></span></li></ul>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Calibri Light",sans-serif"> </span><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:12pt;line-height:105%;font-family:"Calibri Light",sans-serif">Contact:</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%;font-family:"Calibri Light",sans-serif">Please send any inquiry to:</span><span> </span><span style="font-size:12pt;line-height:105%">Omar
Darwish at <a href="mailto:odarwish@emich.edu" target="_blank">odarwish@emich.edu</a>, and Yahya Tashtoush at <a href="mailto:yahya-t@just.edu.jo" target="_blank">yahya-t@just.edu.jo</a></span><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>





</div>

</div>