-------- Forwarded Message -------- Subject: [AISWorld] ***CALL FOR PAPERS*** International Journal of Internet of Things and Cyber-Assurance (IJITCA) Date: Tue, 10 Sep 2019 07:29:50 -0400 From: Tyson Brooks dr.tyson.brooks@ieee.org To: aisworld@lists.aisnet.org
*International Journal of Internet of Things and Cyber-Assurance (IJITCA)*
------------------------------------------------------------------ *Published by: Inderscience Publishers*
http://www.inderscience.com/jhome.php?jcode=ijitca -------------------------------------------------------------------
****Journal Overview****
The objective of this journal is to increase the visibility of current research and emergent trends in Cyber-Assurance theory, application, embedded security and machine-learning for the Internet of Things (IoT), software-defined networks (SDN)/network function virtualization (NFV) and Fog computing architectures based on theoretical aspects and studies of practical applications. Cyber-assurance is the justified confidence that networked IoT systems are adequately secure to meet operational needs, even in the presence of attacks, failures, accidents and unexpected events. Cyber-assurance means that IoT systems, smart internet connected devices (ICD) and networks provide the opportunity of automatically securing themselves against cyber-attacks. The difference is that the concept of cyber-assurance must provide embedded, secure microchips/processors in ICD devices and virtual networks that can continue to operate correctly even when subjected to an attack.
The IJITCA will cover fundamental to advanced topics necessary to grasp the IoT current cyber-assurance issues, challenges and solutions as well as future trends in secure IoT devices and networks. IoT devices and networks may range from hand-held mobile devices to a centralized high performance cloud computing environment consisting of heterogeneous communication systems of both tactical (mobile, wireless) and fixed (wired) communications infrastructures. From an information security perspective, the IoT must address the delivery of authentic, accurate, secure, reliable and timely information (regardless of threat conditions) over these distributed and heterogeneous computing and communication systems. IoT devices using SDN/NFV and Fog computing systems and networks should be able to resist the various security cyber-attacks such as hacking of networks, devices, theft of information, disruption, etc. and be able to continue performing under severe environmental conditions. Through embedded processors and machine learning algorithms over the transmitted information, the miscoding and leaking of information during transmission channels has to monitor any loss, miscoding and leaking of data. Timely adjustments of information with falling quality and automatic switching to the best routing IoT systems by making uses of multi-directional routing is also warranted. Cyber-assurance will need to provide the principles and technologies to unify these systems to deliver the end-state goal of secure IoT systems for greatly enhanced interoperability, scalability, performance, and agility.
Recommended topics for the journal include, but are not limited to, the following:
- Hacking against IoT/Fog computing networks/devices - SDN/NFV security architectures and designs - Vulnerabilities and exploits in SDN/NFV architectures - Automated IoT/Fog computing vulnerability identification, - Research on automated IoT/Fog computing vulnerability assessment and intrusion detection tools and techniques - Genetic algorithms used to spawn and control intelligent agents for information assurance for IoT/Fog computing devices - Network management and visualization tools that support real time planning and control of tactical nets as well as tools for intrusion detection and forensic analysis in hybrid IoT/Fog computing networks - IoT/Fog Computing frameworks which allow diverse input data streams to be transformed into a unified information fusion space for processing using more unified and tractable procedures - Development of secure design methods, architectures, and implementations to minimize IoT/Fog computing power dissipation - IoT/Fog Computing sensor networking systems, including signal processing and communications interactions, distributed detection and estimation, and networking protocols, - High frequency IoT/Fog Computing devices and modules to enhance situational analysis and increase the communication functionality
****Submission Details****
A few essentials for publishing in this journal:
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere. - Conference papers may only be submitted if the paper has been completely re-written and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted. - All IJITCA articles are referred through a double-blind process. - All authors must declare they have read and agreed to the content of the submitted article.
Additional details on submitting your research can be found at the Inderscience Publishers author's submission site: http://www.inderscience.com/info/inauthors/author_submit.php
****Journal Site****
For additional details, please visit: http://www.inderscience.com/jhome.php?jcode=ijitca [Vol. #1 is free of charge, Vol. #2 is published and Vol. 3 is forthcoming].
Dr. Tyson T. Brooks, CISSP, C|EH Adjunct Professor Syracuse University 343 Hinds Hall Syracuse, NY 13244 ttbrooks@syr.edu
EiC- International Journal of the Internet of Things and Cyber-Assurance ijitcaeditor@gmail.com _______________________________________________ AISWorld mailing list AISWorld@lists.aisnet.org