-------- Forwarded Message --------
*International Journal of Internet of Things and Cyber-Assurance
(IJITCA)*
------------------------------------------------------------------
*Published by: Inderscience Publishers*
http://www.inderscience.com/jhome.php?jcode=ijitca
-------------------------------------------------------------------
****Journal Overview****
The objective of this journal is to increase the visibility of
current
research and emergent trends in Cyber-Assurance theory,
application,
embedded security and machine-learning for the Internet of Things
(IoT),
software-defined networks (SDN)/network function virtualization
(NFV) and
Fog computing architectures based on theoretical aspects and
studies of
practical applications. Cyber-assurance is the justified
confidence that
networked IoT systems are adequately secure to meet operational
needs, even
in the presence of attacks, failures, accidents and unexpected
events.
Cyber-assurance means that IoT systems, smart internet connected
devices
(ICD) and networks provide the opportunity of automatically
securing
themselves against cyber-attacks. The difference is that the
concept of
cyber-assurance must provide embedded, secure
microchips/processors in ICD
devices and virtual networks that can continue to operate
correctly even
when subjected to an attack.
The IJITCA will cover fundamental to advanced topics necessary to
grasp the
IoT current cyber-assurance issues, challenges and solutions as
well as
future trends in secure IoT devices and networks. IoT devices and
networks
may range from hand-held mobile devices to a centralized high
performance
cloud computing environment consisting of heterogeneous
communication
systems of both tactical (mobile, wireless) and fixed (wired)
communications infrastructures. From an information security
perspective,
the IoT must address the delivery of authentic, accurate, secure,
reliable
and timely information (regardless of threat conditions) over
these
distributed and heterogeneous computing and communication systems.
IoT
devices using SDN/NFV and Fog computing systems and networks
should be able
to resist the various security cyber-attacks such as hacking of
networks,
devices, theft of information, disruption, etc. and be able to
continue
performing under severe environmental conditions. Through embedded
processors and machine learning algorithms over the transmitted
information, the miscoding and leaking of information during
transmission
channels has to monitor any loss, miscoding and leaking of data.
Timely
adjustments of information with falling quality and automatic
switching to
the best routing IoT systems by making uses of multi-directional
routing is
also warranted. Cyber-assurance will need to provide the
principles and
technologies to unify these systems to deliver the end-state goal
of secure
IoT systems for greatly enhanced interoperability, scalability,
performance, and agility.
Recommended topics for the journal include, but are not limited
to, the
following:
- Hacking against IoT/Fog computing networks/devices
- SDN/NFV security architectures and designs
- Vulnerabilities and exploits in SDN/NFV architectures
- Automated IoT/Fog computing vulnerability identification,
- Research on automated IoT/Fog computing vulnerability assessment
and
intrusion detection tools and techniques
- Genetic algorithms used to spawn and control intelligent agents
for
information assurance for IoT/Fog computing devices
- Network management and visualization tools that support real
time
planning and control of tactical nets as well as tools for
intrusion
detection and forensic analysis in hybrid IoT/Fog computing
networks
- IoT/Fog Computing frameworks which allow diverse input data
streams to
be transformed into a unified information fusion space for
processing using
more unified and tractable procedures
- Development of secure design methods, architectures, and
implementations to minimize IoT/Fog computing power dissipation
- IoT/Fog Computing sensor networking systems, including signal
processing and communications interactions, distributed detection
and
estimation, and networking protocols,
- High frequency IoT/Fog Computing devices and modules to enhance
situational analysis and increase the communication functionality
****Submission Details****
A few essentials for publishing in this journal:
- Submitted articles should not have been previously published or
be
currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been
completely re-written and the author has cleared any necessary
permissions
with the copyright owner if it has been previously copyrighted.
- All IJITCA articles are referred through a double-blind process.
- All authors must declare they have read and agreed to the
content of
the submitted article.
Additional details on submitting your research can be found at the
Inderscience Publishers author's submission site:
http://www.inderscience.com/info/inauthors/author_submit.php
****Journal Site****
For additional details, please visit:
http://www.inderscience.com/jhome.php?jcode=ijitca [Vol. #1 is
free of
charge, Vol. #2 is published and Vol. 3 is forthcoming].
Dr. Tyson T. Brooks, CISSP, C|EH
Adjunct Professor
Syracuse University
343 Hinds Hall
Syracuse, NY 13244
ttbrooks@syr.edu
EiC- International Journal of the Internet of Things and
Cyber-Assurance
ijitcaeditor@gmail.com
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org