From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTPS id 794705D4 for ; Sun, 7 Jul 2019 13:30:10 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.63,462,1557180000"; d="scan'208,217";a="390764777" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 07 Jul 2019 15:30:09 +0200 Received: by sympa.inria.fr (Postfix, from userid 20132) id 5BC2E7ED69; Sun, 7 Jul 2019 15:30:09 +0200 (CEST) Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id 229AE7ED69 for ; Sun, 7 Jul 2019 15:29:21 +0200 (CEST) Authentication-Results: mail2-smtp-roc.national.inria.fr; spf=None smtp.pra=mobilenetwork.chapter@gmail.com; spf=Pass smtp.mailfrom=mobilenetwork.chapter@gmail.com; spf=None smtp.helo=postmaster@mail-lj1-f196.google.com IronPort-PHdr: =?us-ascii?q?9a23=3A1k1QCBULL07EwmWLOXAmYq5/aDzV8LGtZVwlr6E/?= =?us-ascii?q?grcLSJyIuqrYbBGHt8tkgFKBZ4jH8fUM07OQ7/m6HzdQqsje+Fk5M7V0Hycfjs?= =?us-ascii?q?sXmwFySOWkMmbcaMDQUiohAc5ZX0Vk9XzoeWJcGcL5ekGA6ibqtW1aFRrwLxd6?= =?us-ascii?q?KfroEYDOkcu3y/qy+5rOaAlUmTaxe7x/IAiooQnLuMQbgoRuJ6czxxDUvnZGZu?= =?us-ascii?q?NayH9yK1mOhRj8/MCw/JBi8yRUpf0s8tNLXLv5caolU7FWFSwqPG8p6sLlsxnD?= =?us-ascii?q?VhaP6WAHUmoKiBpIAhPK4w/8U5zsryb1rOt92C2dPc3rUbA5XCmp4ql3RBP0ji?= =?us-ascii?q?oMKjk2/X3Zh8Bska5XuQ6tqwFiyILQfY2YNP9yc6XAdt0YWGVBRN5cWCNBDI2y?= =?us-ascii?q?bIUBEvQPMvpFooTmvVQCsQGzCBOwCO/zyDJFgGL9060g0+QmFAHLxBItH9UIsH?= =?us-ascii?q?Tastr1LrkdUeapw6bW0D7OcfNY1y3g44XPdxAhpuqDXbN0ccXPz0kgCR/Fj1uX?= =?us-ascii?q?qYz/PDOZzPgCs2iB4Op4SeKglXQnphp+ojiq3Mgsi43JipgJxVDD8CV02YA4Ls?= =?us-ascii?q?C2Rk58ZN6rCppQtyeCOoRrXsMiXntktzs5yrAApJW1fzAKxYw5yxLDb/GLaYuF?= =?us-ascii?q?7xL5WOqPPTt1h2hpdK+7ihuz90Wr1/fyWdOu0FlQqypIitnMuW4J1xzU8sWHT+?= =?us-ascii?q?Fy/kal2TqW0wDT6PxILVk6labGL5Msw6Q8lpUUsUTEES/2nFv5gLWKeUUj/+ik?= =?us-ascii?q?8+XnYrP4qZ+AL4J4lB3yP6A0lsG8Aek0KBYCU3SY9OimybHu+Uz0TK1PjvIsk6?= =?us-ascii?q?nZtJ7aJd4cpq68GwJV14Ej5A2+DzeiztsYm2cILE5LeRKAlYjpOEvCL+z4Dfil?= =?us-ascii?q?m1SsjClkx+rdM73uB5XCNHnDkLP7cblh7E5czRI/zcpD6JJMFrEBPPXzV1ftu9?= =?us-ascii?q?PCCx85NxW4w+LmCNVmyoMTQnmPA6+cMKPKq1CE/OMvI++WZI8UojnxMfYl5+S9?= =?us-ascii?q?xUM+zHoQe6bh4qlfPHW/FPViLkOUfWXrmNRHGmcDphYzVsTljVSDVXhYYHPkDI?= =?us-ascii?q?wm4TRuI4WgA4rZS4amjfSq8h/zSphRbGFCB1aBDWjvbYbCUPcFcD6fOOdulzUF?= =?us-ascii?q?Uf6qTIp3hkLmjxPz17cydrmcwSYfr5+2jYUsu7/j0Coq/DkxNPyzlnmXRjgtzG?= =?us-ascii?q?wNTj4ymqt4pB4lkwbR4e1Dm/VdUOdrybZMWwY+O4TbyrUjWd/3UwPFONyOTQT/?= =?us-ascii?q?G4j0MXQKVts0huQ2TQN9FtGl1E6R2iOrB/oRleXOCsVlrOTT2H/+I8s7wHHDhv?= =?us-ascii?q?Es?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DXAQAi8yFdZ8TQVdFbCoIZgRVYKig2D?= =?us-ascii?q?FEzFBSEHIEdgl6OYYIRgwiGUXeESYlZFIFnCQEDAQwFHgwBAYFLhSUbBwEEMgc?= =?us-ascii?q?OAQMBAQQBAQIBAgMBEwsLCwYpikAMgjoMgy4dARsMBQ0DEhA3AiQBEQEFASITG?= =?us-ascii?q?4MIgWkBAwkUD5cMgx88iyGBFQUBF4J6BYQwChknDWKBOwIHEoEiiRaCSYIWgRG?= =?us-ascii?q?EVIFSCwOBJBEEgzGCWASMGokNlSsHAoIZhlaNLhuCLG2GNIQMiiQBlHCQFg8hg?= =?us-ascii?q?RwaB4ICcIEBgjsJgT8BVDyBDgELgj9NihM1MAGMFIJSAQE?= X-IPAS-Result: =?us-ascii?q?A0DXAQAi8yFdZ8TQVdFbCoIZgRVYKig2DFEzFBSEHIEdgl6?= =?us-ascii?q?OYYIRgwiGUXeESYlZFIFnCQEDAQwFHgwBAYFLhSUbBwEEMgcOAQMBAQQBAQIBA?= =?us-ascii?q?gMBEwsLCwYpikAMgjoMgy4dARsMBQ0DEhA3AiQBEQEFASITG4MIgWkBAwkUD5c?= =?us-ascii?q?Mgx88iyGBFQUBF4J6BYQwChknDWKBOwIHEoEiiRaCSYIWgRGEVIFSCwOBJBEEg?= =?us-ascii?q?zGCWASMGokNlSsHAoIZhlaNLhuCLG2GNIQMiiQBlHCQFg8hgRwaB4ICcIEBgjs?= =?us-ascii?q?JgT8BVDyBDgELgj9NihM1MAGMFIJSAQE?= X-IronPort-AV: E=Sophos;i="5.63,462,1557180000"; d="scan'208,217";a="390764673" X-MGA-submission: =?us-ascii?q?MDH6pdZHdG3ubgv6A+w8cXJxsN0R1c9LALnZPf?= =?us-ascii?q?r/hxseLSMza4LnsE8gi+Rl7ZP18OIpKpPP+qXz0nxxqg8u3ix47KZfXI?= =?us-ascii?q?VcEyrbGT3mM1N3KwV2M9OvI6ALJkIEuAQEmcRXS3ax9rjMmPtzj4AI2a?= =?us-ascii?q?0PTIDZU2+H4v0SULF9mGukVQ=3D=3D?= Received: from mail-lj1-f196.google.com ([209.85.208.196]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 07 Jul 2019 15:29:20 +0200 Received: by mail-lj1-f196.google.com with SMTP id m8so3807151lji.7 for ; Sun, 07 Jul 2019 06:29:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=qfPrOLPN4N/0+pHOVXUnD1wsWnkzRvg8swF+XpA5G00=; b=Li8W9XZCEoSilxxI8xj1WL4QPxLVsNTb2HMkd287ay4I28rbM3gtAiYS8QuSVVwmet 3qv1qpww90qHwPlFQCG9pxCy/6lM2ayWNBBgspUKbRoERR+qMrXYQ5khWF3UdtgtEpWs hXyz3dIYwrohSSSKGMyrl719J7VAPdbWhvZfiiWYviff4RFcj2uKVt+cjkhJO8tdtikB vmih0M7ntVFsJXHU9Q/t2dPt5MD86KJCpvnAbsv2PnP3QcDmPuKQJHsHoOgovevKkry3 PLRJ+4IpWpGfwVg+E+4o8yYil/oYsLBCpJEQVpgQyoIh6q9h639dQuQSN3fViv+U9Q6k HnDQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=qfPrOLPN4N/0+pHOVXUnD1wsWnkzRvg8swF+XpA5G00=; b=BSqaWAUfIajo0FSdNLg4pZ8g4Bo9V4e6pnnt6R76W7ADpxbnXgGqkvSQ4A351SXN3r WDA+DT/p7RLcUrm25ijdnR1Ex3M3+HBCNvFACG/JrEIOENJZAle16gcEIcz7LeukWcxn QHE3u4TdsSrisTnDlQxIouNWU/wSULjcFKfTcAe+WUr5Tj2LUWWqh6Jaqg1w+Jw4QXew acC/Dcj2SzDJxKSyI1SDfVvpXsmOrbR4r+2fNR91Ve5+p5wIuqQxZ1XH6eRbFrTCvBSx uQqYnS77tHSbX67I8l5hAM1xIuTNd1r1RSpfk6ZXv/W8dvPvBff70Amh6aHjSzSdNUxp nYzg== X-Gm-Message-State: APjAAAWLPQdHHkgmCeK6T58kRTUUDcnOUWlhR0mwwTTvFZKMfnrmtdDM k87KuBbbaLr+n5xaAXAbJ/V9pq7qn7WMhYai3N8= X-Google-Smtp-Source: APXvYqxFeyranBNLW83pU86FbDM0D7S7Lgw8vJayDwu6rNQkUPLjW7WH0k1ye7mRduIKsC6+kipjzq/LpN6iFTeMsVs= X-Received: by 2002:a2e:9754:: with SMTP id f20mr7214635ljj.151.1562506159600; Sun, 07 Jul 2019 06:29:19 -0700 (PDT) MIME-Version: 1.0 From: Conference CFP Date: Sun, 7 Jul 2019 21:29:09 +0800 Message-ID: To: Meng WZ Content-Type: multipart/alternative; boundary="0000000000009a38d7058d175025" X-Validation-by: mobilenetwork.chapter@gmail.com Subject: [Caml-list] [CFP] ADIoT 2019 with ESORICS 2019 [9 July Firm!] + 4 Special Issues Reply-To: Conference CFP X-Loop: caml-list@inria.fr X-Sequence: 17677 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --0000000000009a38d7058d175025 Content-Type: text/plain; charset="UTF-8" All qualified papers will be invited to submit an extended version to four special issues. http://adiot2019.compute.dtu.dk/ -------------------------------------------- The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms. This workshop will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Topics of interest include, but are not limited to the ones listed below. - Malware and unwanted software for IoT - Vulnerability analysis and reverse engineering for IoT - IoT security and privacy - IoT forensic techniques - Usable security and privacy for IoT - Intrusion detection and prevention for IoT - Cyber intelligence techniques for IoT - IoT infrastructures and mitigation techniques - IoT Hardware security - Cyber physical systems security - Adversarial learning for IoT - IoT Cyber crime - Denial-of-Service attacks for IoT - Security measurement for IoT - IoT security visualization techniques - Edge/Fog computing attack and defense Important Dates: - Workshop paper submission deadline: July 9, 2019 [Final!] - Workshop paper notification: July 30, 2019 - Camera-ready version deadline: August 10, 2019 Submission Guidelines: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 16 pages (full paper) or 8 pages (short paper) in the LNCS format, including the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop. All qualified papers will be invited to submit an extended version to several special issues. 1. Sensors, IF=2.475, Special Issue on Threat Identification and Defence for Internet-of-Things 2. Journal of Information Security and Applications (SCI-indexed) 3. Symmetry, IF=1.256, Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy 4. International Journal of Network Management, Impact Factor: 1.34, Special Issue on Trust and Privacy in Internet of Things: Challenges and Solutions ---------------------------------------- General Co-Chairs - Anthony T.S. Ho, University of Surrey, UK - Shouhuai Xu, University of Texas at San Antonio, USA Program Co-Chairs - Weizhi Meng, Technical University of Denmark, Denmark - Steve Furnell, University of Plymouth, UK - Qian Chen, University of Texas at San Antonio, USA The accepted papers will have post-proceedings published in LNCS by Springer. If there is any question, please contact us at: adiot2019@easychair.org. --0000000000009a38d7058d175025 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
All qualified papers will be invited= to submit an extended version to four special issues.=C2=A0
http://adiot2019.compute.dtu.dk= /=C2=A0
--------------------------------------------=C2=A0
The In= ternet of Things (IoT) technology is widely adopted by the vast majority of= businesses and is impacting every aspect of the world. However, the nature= s of the Internet, communication, embedded OS and backend recourses make Io= T objects vulnerable to cyber attacks. In addition, most standard security = solutions designed for enterprise systems are not applicable to IoT devices= . As a result, we are facing a big IoT security and protection challenge, a= nd it is urgent to analyze IoT-specific cyber attacks to design novel and e= fficient security mechanisms.=C2=A0

This workshop will focus on IoT = attacks and defenses, and seek original submissions that discuss either pra= ctical or theoretical solutions to identify IoT vulnerabilities and IoT sec= urity mechanisms. Topics of interest include, but are not limited to the on= es listed below.=C2=A0

- Malware and unwanted software for IoT=C2=A0=
- Vulnerability analysis and reverse engineering for IoT=C2=A0
- IoT= security and privacy=C2=A0
- IoT forensic techniques=C2=A0
- Usable = security and privacy for IoT=C2=A0
- Intrusion detection and prevention = for IoT=C2=A0
- Cyber intelligence techniques for IoT=C2=A0
- IoT inf= rastructures and mitigation techniques=C2=A0
- IoT Hardware security=C2= =A0
- Cyber physical systems security=C2=A0
- Adversarial learning fo= r IoT=C2=A0
- IoT Cyber crime=C2=A0
- Denial-of-Service attacks for I= oT=C2=A0
- Security measurement for IoT=C2=A0
- IoT security visualiz= ation techniques=C2=A0
- Edge/Fog computing attack and defense=C2=A0
=

Important Dates:=C2=A0

- Workshop paper submission deadline:= July 9, 2019=C2=A0 [Final!]
- Workshop paper notification: July 30, 201= 9=C2=A0
- Camera-ready version deadline: August 10, 2019=C2=A0

Submission Guidelines:=C2=A0

Submitted papers must not substantial= ly overlap papers that have been published or that are simultaneously submi= tted to a journal or a conference with proceedings. Papers should be at mos= t 16 pages (full paper) or 8 pages (short paper) in the LNCS format, includ= ing the bibliography and well-marked appendices. Committee members are not = required to read the appendices, so the paper should be intelligible withou= t them. All submissions must be written in English. Authors of accepted pap= ers must guarantee that their papers will be registered and presented at th= e workshop.=C2=A0

All qualified papers will be invited to submit an = extended version to several special issues.=C2=A0

1. Sensors, IF=3D2= .475, Special Issue on Threat Identification and Defence for Internet-of-Th= ings=C2=A0

2. Journal of Information Security and Applications (SCI-= indexed)=C2=A0

3. Symmetry, IF=3D1.256, Special Issue on Symmetry an= d Asymmetry Applications for Internet of Things Security and Privacy=C2=A0<= br>
4. International Journal of Network Management, Impact Factor: 1.34,= Special Issue on Trust and Privacy in Internet of Things: Challenges and S= olutions=C2=A0

----------------------------------------=C2=A0
Gen= eral Co-Chairs=C2=A0
- Anthony T.S. Ho, University of Surrey, UK=C2=A0- Shouhuai Xu, University of Texas at San Antonio, USA=C2=A0

Progr= am Co-Chairs=C2=A0
- Weizhi Meng, Technical University of Denmark, Denma= rk=C2=A0
- Steve Furnell, University of Plymouth, UK=C2=A0
- Qian Che= n, University of Texas at San Antonio, USA=C2=A0

The accepted papers= will have post-proceedings published in LNCS by Springer.=C2=A0

If = there is any question, please contact us at:=C2=A0adiot2019@easychair.org.


<= /div>

--0000000000009a38d7058d175025--