-------- Forwarded Message --------
Subject: [AISWorld] ***CALL FOR PAPERS*** International Journal of Internet of Things and Cyber-Assurance (IJITCA)
Date: Tue, 10 Sep 2019 07:29:50 -0400
From: Tyson Brooks <dr.tyson.brooks@ieee.org>
To: aisworld@lists.aisnet.org


*International Journal of Internet of Things and Cyber-Assurance (IJITCA)*

------------------------------------------------------------------
*Published by: Inderscience Publishers*

http://www.inderscience.com/jhome.php?jcode=ijitca
-------------------------------------------------------------------

****Journal Overview****

The objective of this journal is to increase the visibility of current
research and emergent trends in Cyber-Assurance theory, application,
embedded security and machine-learning for the Internet of Things (IoT),
software-defined networks (SDN)/network function virtualization (NFV) and
Fog computing architectures based on theoretical aspects and studies of
practical applications. Cyber-assurance is the justified confidence that
networked IoT systems are adequately secure to meet operational needs, even
in the presence of attacks, failures, accidents and unexpected events.
Cyber-assurance means that IoT systems, smart internet connected devices
(ICD) and networks provide the opportunity of automatically securing
themselves against cyber-attacks. The difference is that the concept of
cyber-assurance must provide embedded, secure microchips/processors in ICD
devices and virtual networks that can continue to operate correctly even
when subjected to an attack.

The IJITCA will cover fundamental to advanced topics necessary to grasp the
IoT current cyber-assurance issues, challenges and solutions as well as
future trends in secure IoT devices and networks. IoT devices and networks
may range from hand-held mobile devices to a centralized high performance
cloud computing environment consisting of heterogeneous communication
systems of both tactical (mobile, wireless) and fixed (wired)
communications infrastructures. From an information security perspective,
the IoT must address the delivery of authentic, accurate, secure, reliable
and timely information (regardless of threat conditions) over these
distributed and heterogeneous computing and communication systems. IoT
devices using SDN/NFV and Fog computing systems and networks should be able
to resist the various security cyber-attacks such as hacking of networks,
devices, theft of information, disruption, etc. and be able to continue
performing under severe environmental conditions. Through embedded
processors and machine learning algorithms over the transmitted
information, the miscoding and leaking of information during transmission
channels has to monitor any loss, miscoding and leaking of data. Timely
adjustments of information with falling quality and automatic switching to
the best routing IoT systems by making uses of multi-directional routing is
also warranted. Cyber-assurance will need to provide the principles and
technologies to unify these systems to deliver the end-state goal of secure
IoT systems for greatly enhanced interoperability, scalability,
performance, and agility.

Recommended topics for the journal include, but are not limited to, the
following:

- Hacking against IoT/Fog computing networks/devices
- SDN/NFV security architectures and designs
- Vulnerabilities and exploits in SDN/NFV architectures
- Automated IoT/Fog computing vulnerability identification,
- Research on automated IoT/Fog computing vulnerability assessment and
intrusion detection tools and techniques
- Genetic algorithms used to spawn and control intelligent agents for
information assurance for IoT/Fog computing devices
- Network management and visualization tools that support real time
planning and control of tactical nets as well as tools for intrusion
detection and forensic analysis in hybrid IoT/Fog computing networks
- IoT/Fog Computing frameworks which allow diverse input data streams to
be transformed into a unified information fusion space for processing using
more unified and tractable procedures
- Development of secure design methods, architectures, and
implementations to minimize IoT/Fog computing power dissipation
- IoT/Fog Computing sensor networking systems, including signal
processing and communications interactions, distributed detection and
estimation, and networking protocols,
- High frequency IoT/Fog Computing devices and modules to enhance
situational analysis and increase the communication functionality

****Submission Details****

A few essentials for publishing in this journal:

- Submitted articles should not have been previously published or be
currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been
completely re-written and the author has cleared any necessary permissions
with the copyright owner if it has been previously copyrighted.
- All IJITCA articles are referred through a double-blind process.
- All authors must declare they have read and agreed to the content of
the submitted article.

Additional details on submitting your research can be found at the
Inderscience Publishers author's submission site:
http://www.inderscience.com/info/inauthors/author_submit.php

****Journal Site****

For additional details, please visit:
http://www.inderscience.com/jhome.php?jcode=ijitca [Vol. #1 is free of
charge, Vol. #2 is published and Vol. 3 is forthcoming].

Dr. Tyson T. Brooks, CISSP, C|EH
Adjunct Professor
Syracuse University
343 Hinds Hall
Syracuse, NY 13244
ttbrooks@syr.edu

EiC- International Journal of the Internet of Things and Cyber-Assurance
ijitcaeditor@gmail.com
_______________________________________________
AISWorld mailing list
AISWorld@lists.aisnet.org