From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTP id 1483B5D4 for ; Fri, 28 Jun 2019 17:39:31 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.63,428,1557180000"; d="scan'208,217";a="389623406" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 28 Jun 2019 19:39:30 +0200 Received: by sympa.inria.fr (Postfix, from userid 20132) id A0F7C826E5; Fri, 28 Jun 2019 19:39:30 +0200 (CEST) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 3ADC7826B2 for ; Fri, 28 Jun 2019 19:37:24 +0200 (CEST) Authentication-Results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=mobilenetwork.chapter@gmail.com; spf=Pass smtp.mailfrom=mobilenetwork.chapter@gmail.com; spf=None smtp.helo=postmaster@mail-lf1-f67.google.com IronPort-PHdr: =?us-ascii?q?9a23=3A19iNhRPPKqLPwbwEpxkl6mtUPXoX/o7sNwtQ0KIM?= =?us-ascii?q?zox0Ivn4rarrMEGX3/hxlliBBdydt6sezbCO+Pm5BSRAuc/H7ClbNsQUFlcsso?= =?us-ascii?q?Y/p0QYGsmLCEn2frbBThcRO4B8bmJj5GyxKkNPGczzNBX4q3y26iMOSF2kbVIm?= =?us-ascii?q?buv6FZTPgMupyuu854PcYxlShDq6fLh+MAi6oR/eu8ULn4duMLg9xgfGrndVZu?= =?us-ascii?q?hbyn5jKVaPkxrh/Mu984Nv/zlKt/4968JMVLjxcrglQ7BfEDkoKX0+6tfxtRnE?= =?us-ascii?q?QwuP538cXXsTnxFVHQXL7wz0U4novCfiueVzxCeVPcvtTbApQjui9LtkSAXpiC?= =?us-ascii?q?gcKTE09nzch9Fqg6JapBKhoAF/w5LRbYqIOvdyYr/RcNUHTmVGQstcWTBNDp6l?= =?us-ascii?q?Y4cTEuYKIOJUo5T9qlcLqxa1GAuiC/71yjJQiXD43aM03ec8Hw/YwAMtAskDv2?= =?us-ascii?q?7IoNjvLqoeTfy5wavOwD7eb/1WwzD96I3Qfx0/pvGMW7xwftTLyUYxEQPKkkuf?= =?us-ascii?q?opH7Mj2VzOoGrm+W7+9nVe20im4nrx9+oj6xyccwhIjJgZgVylPe+SplwIY6P8?= =?us-ascii?q?W4SFJlbt6+C5ZQuCSaOJF3QsMmWW1npCE6yrgftJO9YSMEy4wnygbBZ/Cbd4WE?= =?us-ascii?q?+BHuWeaLLTtlhX9oeqizihew/EWm1+byTNO70ExQoSpAitTMtm4C1xjU6sWfT/?= =?us-ascii?q?ty5Eah2TKW2wDX5OFIPFk4laTaJpMj2LIwmZ0TsUPMHi/yhkr6lrOZdkIh+uSw?= =?us-ascii?q?6uTnZKvppoOEOoNqlg3zNr4il8+/DOgiLwQDXmqW9f692bDh5UH5Ra9Fjvwykq?= =?us-ascii?q?nXqpDaIsEbq7a8Aw9SyYkj6hK/ACmg0NsGgXkGIlVFeAiEj4TzJ17OIOr3De+j?= =?us-ascii?q?g1uyijdm3P/GPrj7DZXMKnjPiqvufbF460JE0go80chf545ICrEGOP/8RlX+tN?= =?us-ascii?q?ncDhMgNwy0wv3nCMlm24MFWWOPB7eZP7nIvV+J4OIvOeiMa5UPtDbzMfh2r8Lp?= =?us-ascii?q?2Fo0n1BVQpvhiZ4QYnG8E/JrP1qee3mqidcICXsHpCIxSeXrjBuJVjsFNFioWK?= =?us-ascii?q?dpzTY9Bo+8AIHIS8iGroTJiCK8FJxSa2ZLFk+LC3SufIWNQ+sBcgqdJ8ZglnoP?= =?us-ascii?q?Ur33GNxp7g2nqAKvk+kvFeHT4CBN7M+6iIpFotbLnBR3zgRaStyH2jjUHW5xl2?= =?us-ascii?q?IMATQx2fIn+BEv+hK4yaF9xsdgO5lT6vdOCFpoMJfdy6l+BYm3VFyeONiOT1mi?= =?us-ascii?q?T5OtBjRjFotgke9LWF50HpCZtj6G2iOrB7EPkLnSXc4796vd2z76IMMvkns=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0C8BgAHTxZdZ0OnVdFbCh4BBgcGgWeBF?= =?us-ascii?q?VgqKDZdMxQUhByBHYJejnmLaAN0iCCGFoFnCQEDAQwFKgEBgUuFdxsHAQQ0EwE?= =?us-ascii?q?DAQEEAQECAQIDARMLCwsGKYpADII6DIMuHQEbDAUNAxIQNwIkAREBBQEiExuEc?= =?us-ascii?q?QEDCRSYT4MfPIshgRUFAReCegWERAoZJw1igToCBxKBIokWgkmCFoERhFSDBBE?= =?us-ascii?q?EgzGCWASMDYkJlRYHAoIYk3kbgiuHGoQMihEBpGcPIYFGgXlwgQGCO4FIAXgYg?= =?us-ascii?q?Q4BC4I/imA1MI1xglIBAQ?= X-IPAS-Result: =?us-ascii?q?A0C8BgAHTxZdZ0OnVdFbCh4BBgcGgWeBFVgqKDZdMxQUhBy?= =?us-ascii?q?BHYJejnmLaAN0iCCGFoFnCQEDAQwFKgEBgUuFdxsHAQQ0EwEDAQEEAQECAQIDA?= =?us-ascii?q?RMLCwsGKYpADII6DIMuHQEbDAUNAxIQNwIkAREBBQEiExuEcQEDCRSYT4MfPIs?= =?us-ascii?q?hgRUFAReCegWERAoZJw1igToCBxKBIokWgkmCFoERhFSDBBEEgzGCWASMDYkJl?= =?us-ascii?q?RYHAoIYk3kbgiuHGoQMihEBpGcPIYFGgXlwgQGCO4FIAXgYgQ4BC4I/imA1MI1?= =?us-ascii?q?xglIBAQ?= X-IronPort-AV: E=Sophos;i="5.63,428,1557180000"; d="scan'208,217";a="311816323" X-MGA-submission: =?us-ascii?q?MDGrgF9xISRGmsadexwJoDVQe4VFQI/BrSYEsq?= =?us-ascii?q?37t6oLyfAZsfuOlWlUnJUUJ0TIiXi4Y0QavtoOZpaUcHjBP7eI7AqtV8?= =?us-ascii?q?zpCtp9HwwQjGrtTdF2uFKMdJiFTNvZkxht+5zpKPn2xAYHUrvEpIk/1w?= =?us-ascii?q?bIzYK3iCNhFi3BP9FM6TSg9Q=3D=3D?= Received: from mail-lf1-f67.google.com ([209.85.167.67]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 28 Jun 2019 19:37:23 +0200 Received: by mail-lf1-f67.google.com with SMTP id y17so4520944lfe.0 for ; Fri, 28 Jun 2019 10:37:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=bDvy8pxNwtX+rSBfHUYP1kbiQMF0hk6oeHpZ+Z0EikA=; b=MT4IA9CyyXH0s3wu1KBAoeJ2MpB9RplVxCaW6qk4/QXxJYh+R1HAU+FfgTC1kHacd8 94jeO2zFmqSBu9sjx5KR5+ZGfAXehxzk7JNS9A8Byv33DQKpAxA8dL6jHFCM/EQKc7bs 6S8mUOEldYcRKXbyUngE4tC/pfifYa4SrNSf6FM5BR5MUtnQVUGn79M2IU4k12fq7zD6 V3rAbDDq3ZvRbmb/1ZIPSsvKqO3xd1kGbY44/SWSAxYJA80N5ORahsLv1MKDFVBFliR7 EyNSmSkPv8sxrhZKvYcjRb0hjlnFwj1HPtcaQJ46PRkBqExLXiC4I4IcuKaHyvA0PPxy zHoA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=bDvy8pxNwtX+rSBfHUYP1kbiQMF0hk6oeHpZ+Z0EikA=; b=eX/DYoXyBjv3512jISAAE83jdnk7ZnpoF21x+u/g/1075DfA+dlG/U+kOR9auEH8zR XHI16QRHfkSjtDSdugdojsYjfMD5xWplxprSC1ubSICCKEkAlyI94lAqkPgjegrO6hd8 yIzjLbUJ73dhdmj8bVpdMFKZctm7h+hfkrAOnzo8GU2E8RLYC1PM4S6OLOnGkF/GtNfE GfTFbdYa/fPpZ+rk5BlnmQjCYzMzf7Fp1cJGnORhzgtSwT1ckJ1cXrricCnHI18dMRrL laFO+u/GFuXZbM4zLeoLjTpSid9Lr0cmrQcr1v3BpmZYatbwE4Nl1itDA5ZGuJNN5aN2 L5EQ== X-Gm-Message-State: APjAAAWDX1LCQHYXqFa8QzFLWO1XA1ACJII/JAfXDwW4zSW/RBghQ4oA tsPQiKixW0RLCDV6bzi+WH4joHOLgHzDl+oYP/4= X-Google-Smtp-Source: APXvYqznNwM5ZPR40HxzyY0XtfyE3gUzxngXb+pxXQpsZAUYicP4DQdZILjPDymdzrKWoGrKrmj7ZVeSNKGKr3chfnc= X-Received: by 2002:ac2:54ae:: with SMTP id w14mr5528617lfk.124.1561743442104; Fri, 28 Jun 2019 10:37:22 -0700 (PDT) MIME-Version: 1.0 From: Conference CFP Date: Sat, 29 Jun 2019 01:37:10 +0800 Message-ID: To: Meng WZ Content-Type: multipart/alternative; boundary="00000000000018d533058c65bb0a" X-Validation-by: mobilenetwork.chapter@gmail.com Subject: [Caml-list] [CFP] ADIoT 2019 with ESORICS 2019 [8 July Extended] + 4 Special Issues Reply-To: Conference CFP X-Loop: caml-list@inria.fr X-Sequence: 17652 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --00000000000018d533058c65bb0a Content-Type: text/plain; charset="UTF-8" All qualified papers will be invited to submit an extended version to four special issues. -------------------------------------------- The Internet of Things (IoT) technology is widely adopted by the vast majority of businesses and is impacting every aspect of the world. However, the natures of the Internet, communication, embedded OS and backend recourses make IoT objects vulnerable to cyber attacks. In addition, most standard security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and it is urgent to analyze IoT-specific cyber attacks to design novel and efficient security mechanisms. This workshop will focus on IoT attacks and defenses, and seek original submissions that discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Topics of interest include, but are not limited to the ones listed below. - Malware and unwanted software for IoT - Vulnerability analysis and reverse engineering for IoT - IoT security and privacy - IoT forensic techniques - Usable security and privacy for IoT - Intrusion detection and prevention for IoT - Cyber intelligence techniques for IoT - IoT infrastructures and mitigation techniques - IoT Hardware security - Cyber physical systems security - Adversarial learning for IoT - IoT Cyber crime - Denial-of-Service attacks for IoT - Security measurement for IoT - IoT security visualization techniques - Edge/Fog computing attack and defense Important Dates: - Workshop paper submission deadline: July 8, 2019 [Extended] - Workshop paper notification: July 30, 2019 - Camera-ready version deadline: August 10, 2019 Submission Guidelines: Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 16 pages (full paper) or 8 pages (short paper) in the LNCS format, including the bibliography and well-marked appendices. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Authors of accepted papers must guarantee that their papers will be registered and presented at the workshop. All qualified papers will be invited to submit an extended version to several special issues. 1. Sensors, IF=2.475, Special Issue on Threat Identification and Defence for Internet-of-Things 2. Journal of Information Security and Applications (SCI-indexed) 3. Symmetry, IF=1.256, Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy 4. International Journal of Network Management, Impact Factor: 1.34, Special Issue on Trust and Privacy in Internet of Things: Challenges and Solutions ---------------------------------------- General Co-Chairs - Anthony T.S. Ho, University of Surrey, UK - Shouhuai Xu, University of Texas at San Antonio, USA Program Co-Chairs - Weizhi Meng, Technical University of Denmark, Denmark - Steve Furnell, University of Plymouth, UK - Qian Chen, University of Texas at San Antonio, USA The accepted papers will have post-proceedings published in LNCS by Springer. If there is any question, please contact us at: adiot2019@easychair.org. --00000000000018d533058c65bb0a Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
All qualified papers will be = invited to submit an extended version to four special issues.=C2=A0

= --------------------------------------------=C2=A0
The Internet of Thing= s (IoT) technology is widely adopted by the vast majority of businesses and= is impacting every aspect of the world. However, the natures of the Intern= et, communication, embedded OS and backend recourses make IoT objects vulne= rable to cyber attacks. In addition, most standard security solutions desig= ned for enterprise systems are not applicable to IoT devices. As a result, = we are facing a big IoT security and protection challenge, and it is urgent= to analyze IoT-specific cyber attacks to design novel and efficient securi= ty mechanisms.=C2=A0

This workshop will focus on IoT attacks and def= enses, and seek original submissions that discuss either practical or theor= etical solutions to identify IoT vulnerabilities and IoT security mechanism= s. Topics of interest include, but are not limited to the ones listed below= .=C2=A0

- Malware and unwanted software for IoT=C2=A0
- Vulnerabi= lity analysis and reverse engineering for IoT=C2=A0
- IoT security and p= rivacy=C2=A0
- IoT forensic techniques=C2=A0
- Usable security and pr= ivacy for IoT=C2=A0
- Intrusion detection and prevention for IoT=C2=A0- Cyber intelligence techniques for IoT=C2=A0
- IoT infrastructures an= d mitigation techniques=C2=A0
- IoT Hardware security=C2=A0
- Cyber p= hysical systems security=C2=A0
- Adversarial learning for IoT=C2=A0
-= IoT Cyber crime=C2=A0
- Denial-of-Service attacks for IoT=C2=A0
- Se= curity measurement for IoT=C2=A0
- IoT security visualization techniques= =C2=A0
- Edge/Fog computing attack and defense=C2=A0


Importan= t Dates:=C2=A0

- Workshop paper submission deadline: July 8, 2019=C2= =A0 [Extended]
- Workshop paper notification: July 30, 2019=C2=A0
- C= amera-ready version deadline: August 10, 2019=C2=A0


Submission G= uidelines:=C2=A0

Submitted papers must not substantially overlap pap= ers that have been published or that are simultaneously submitted to a jour= nal or a conference with proceedings. Papers should be at most 16 pages (fu= ll paper) or 8 pages (short paper) in the LNCS format, including the biblio= graphy and well-marked appendices. Committee members are not required to re= ad the appendices, so the paper should be intelligible without them. All su= bmissions must be written in English. Authors of accepted papers must guara= ntee that their papers will be registered and presented at the workshop.=C2= =A0

All qualified papers will be invited to submit an extended versi= on to several special issues.=C2=A0

1. Sensors, IF=3D2.475, Special = Issue on Threat Identification and Defence for Internet-of-Things=C2=A0
=
2. Journal of Information Security and Applications (SCI-indexed)=C2=A0=

3. Symmetry, IF=3D1.256, Special Issue on Symmetry and Asymmetry Ap= plications for Internet of Things Security and Privacy=C2=A0

4. Inte= rnational Journal of Network Management, Impact Factor: 1.34, Special Issue= on Trust and Privacy in Internet of Things: Challenges and Solutions=C2=A0=

----------------------------------------=C2=A0
General Co-Chairs= =C2=A0
- Anthony T.S. Ho, University of Surrey, UK=C2=A0
- Shouhuai X= u, University of Texas at San Antonio, USA=C2=A0

Program Co-Chairs= =C2=A0
- Weizhi Meng, Technical University of Denmark, Denmark=C2=A0
= - Steve Furnell, University of Plymouth, UK=C2=A0
- Qian Chen, Universit= y of Texas at San Antonio, USA=C2=A0

The accepted papers will have p= ost-proceedings published in LNCS by Springer.=C2=A0

If there is any= question, please contact us at:=C2=A0adiot2019@easychair.org.


--00000000000018d533058c65bb0a--