caml-list - the Caml user's mailing list
 help / color / Atom feed
From: Conference CFP <mobilenetwork.chapter@gmail.com>
To: Meng WZ <mobilenetwork.chapter@gmail.com>
Subject: [Caml-list] DCN Special Issue on Security and Privacy Protection in the Era of IoT Devices
Date: Fri, 15 Nov 2019 23:43:07 +0800
Message-ID: <CAL8OcN2o55YiaBmiwVirPMzaTfA6cwKSXBby2ORoO-vmTVXaVw@mail.gmail.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 3086 bytes --]

IoT devices like smartphones have become an important personal assistant
and an indispensable part of our everyday life and work. With more and more
users storing their private data on phones, it becomes greatly important to
develop secure mobile operating systems, secure mobile cloud and
applications, and secure mobile devices. In recent years, IoT device
security like smartphone security depends not only on the phones, but also
on the mobile device management technology that controls and manages device
security. As a result, there is an increasing need for secure solutions to
protect users' sensitive and private information in the IoT environment.

This special issue will focus on IoT device security and privacy issues,
and aims to bring together research contributions of unpublished research
on the recent development and innovations about the technologies to protect
mobile security and privacy.

Potential topics, but are not limited to:

The goal of this special issue is to collect high-quality contributions to
address the human-centric challenges and solutions for IoT device security
and privacy. Topics of interest include, but are not limited to the ones
listed below.

   - Adversarial modeling
   - Vulnerability Assessment and testing
   - Intrusion detection and prevention schemes
   - Mobile and cloud device and applications management
   - Impact of human social behavior on mobile usage
   - Secure routing and access control
   - Mobile device management challenges
   - Digital forensics on mobile operating systems, applications and
   smartphones
   - Secure mobile application development
   - Mobile and cloud application security and digital forensics
   - Mobile and cloud user authentication and authorization
   - Multi-factor mobile and cloud authentication
   - Mobile and cloud user privacy
   - Blockchain technology
   - Big data mining
   - Advance persistent threats
   - Biometric security and privacy

Important Dates

   - Submission deadline: 30 December 2019
   - Initial notification: 30 February 2020
   - Final acceptance/rejection notification: 15 May 2020

Guest Editors

   - Dr. Weizhi Meng,Technical University of Denmark, Denmark
   - Dr. Daniel Xiapu Luo, Hong Kong Polytechnic University, China
   - Dr. Chunhua Su, University of Aizu, Japan
   - Prof. Debiao He, Wuhan University, China
   - Dr. Marios Anagnostopoulos, Norwegian University of Science and
   Technology, Norway
   - Dr. Qian Chen, University of Texas at San Antonio, USA

Submission Guidelines

Authors should prepare their manuscript according to “Guide for Authors” at
http://www.keaipublishing.com/en/journals/digital-communications-and-networks/guide-for-authors/
and
submit their manuscripts through the Manuscript Tracking System at
https://www.evise.com/profile/#/DCAN/login <https://www.evise.com/profile/>。All
papers will be peer-reviewed by at least three independent reviewers.
Requests for additional information should be addressed to the
Corresponding Guest Editor.

[-- Attachment #2: Type: text/html, Size: 5167 bytes --]

<div dir="ltr"><p style="margin:0px 0px 15px;color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px"><span style="text-align:justify">IoT devices like smartphones have become an important personal assistant and an indispensable part of our everyday life and work. With more and more users storing their private data on phones, it becomes greatly important to develop secure mobile operating systems, secure mobile cloud and applications, and secure mobile devices. In recent years, IoT device security like smartphone security depends not only on the phones, but also on the mobile device management technology that controls and manages device security. As a result, there is an increasing need for secure solutions to protect users&#39; sensitive and private information in the IoT environment.</span></p><p style="margin:0px 0px 15px;color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px">This special issue will focus on IoT device security and privacy issues, and aims to bring together research contributions of unpublished research on the recent development and innovations about the technologies to protect mobile security and privacy. </p><p style="margin:0px 0px 15px;color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px"><span style="color:rgb(49,53,56);font-family:OpenSansSemiboldRegular">Potential topics, but are not limited to:</span></p><p style="margin:0px 0px 15px;color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px">The goal of this special issue is to collect high-quality contributions to address the human-centric challenges and solutions for IoT device security and privacy. Topics of interest include, but are not limited to the ones listed below.</p><ul style="color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px"><li>Adversarial modeling</li><li>Vulnerability Assessment and testing</li><li>Intrusion detection and prevention schemes </li><li>Mobile and cloud device and applications management</li><li>Impact of human social behavior on mobile usage</li><li>Secure routing and access control </li><li>Mobile device management challenges</li><li>Digital forensics on mobile operating systems, applications and smartphones</li><li>Secure mobile application development</li><li>Mobile and cloud application security and digital forensics</li><li>Mobile and cloud user authentication and authorization</li><li>Multi-factor mobile and cloud authentication</li><li>Mobile and cloud user privacy</li><li>Blockchain technology</li><li>Big data mining</li><li>Advance persistent threats</li><li>Biometric security and privacy</li></ul><h3 style="margin:0px 0px 10px;padding:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-weight:normal;font-stretch:normal;font-size:18px;line-height:normal;font-family:OpenSansSemiboldRegular;color:rgb(102,102,102);clear:both"><span style="color:rgb(49,53,56);font-size:1.4em">Important Dates</span></h3><ul style="color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px"><li>Submission deadline: 30 December 2019</li><li>Initial notification: 30 February 2020</li><li>Final acceptance/rejection notification: 15 May 2020</li></ul><h3 style="margin:0px 0px 10px;padding:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-weight:normal;font-stretch:normal;font-size:18px;line-height:normal;font-family:OpenSansSemiboldRegular;color:rgb(102,102,102);clear:both"><span style="color:rgb(49,53,56)">Guest Editors</span></h3><ul style="color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px"><li>Dr. Weizhi Meng,Technical University of Denmark, Denmark</li><li>Dr. Daniel Xiapu Luo, Hong Kong Polytechnic University, China</li><li>Dr. Chunhua Su, University of Aizu, Japan</li><li>Prof. Debiao He, Wuhan University, China</li><li>Dr. Marios Anagnostopoulos, Norwegian University of Science and Technology, Norway</li><li>Dr. Qian Chen, University of Texas at San Antonio, USA</li></ul><h3 style="margin:0px 0px 10px;padding:0px;font-variant-numeric:normal;font-variant-east-asian:normal;font-weight:normal;font-stretch:normal;font-size:18px;line-height:normal;font-family:OpenSansSemiboldRegular;color:rgb(102,102,102);clear:both"><span style="color:rgb(49,53,56)">Submission Guidelines</span></h3><p style="margin:0px 0px 15px;color:rgb(68,68,68);font-family:OpenSansRegular;font-size:13px">Authors should prepare their manuscript according to “Guide for Authors” at <a href="http://www.keaipublishing.com/en/journals/digital-communications-and-networks/guide-for-authors/" style="text-decoration-line:none;color:rgb(20,90,116)">http://www.keaipublishing.com/en/journals/digital-communications-and-networks/guide-for-authors/</a> and submit their manuscripts through the Manuscript Tracking System at <span style="font-family:calibri"><a href="https://www.evise.com/profile/" style="text-decoration-line:none;color:rgb(20,90,116)">https://www.evise.com/profile/#/DCAN/login</a></span><span style="font-family:simsun">。</span>All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the Corresponding Guest Editor.</p></div>

                 reply index

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publically to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAL8OcN2o55YiaBmiwVirPMzaTfA6cwKSXBby2ORoO-vmTVXaVw@mail.gmail.com \
    --to=mobilenetwork.chapter@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

caml-list - the Caml user's mailing list

Archives are clonable:
	git clone --mirror http://inbox.vuxu.org/caml-list
	git clone --mirror https://inbox.ocaml.org/caml-list

Example config snippet for mirrors

Newsgroup available over NNTP:
	nntp://inbox.vuxu.org/vuxu.archive.caml-list


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git