[AISWorld] UVA Lifelong Learning - Cybersecurity: Risks and Solutions for Physical Systems’ Cyber-Attacks

Sylvertooth, Randall randall.e.sylvertooth at hq.dhs.gov
Thu May 5 11:22:53 EDT 2016


Hello All,

I just wanted to let you know about an event that my alma mata University of Virginia will be hosting coming up soon on May 19, 2016.

It’s free and you can register from this link.

http://alumni.virginia.edu/learn/program/cybersecurity-risks-and-solutions-for-physical-systems-cyber-attacks/

-Randy

Randall E. Sylvertooth
U.S. Department of Energy LNO
Cyber Threat Intelligence
Department of Homeland Security
National Cybersecurity & Communication Integration Center
Watch Floor: (703) 235-8849
Fax: (703) 235-5673
e-mail: randall.e.sylvertooth at hq.dhs.gov<mailto:randall.e.sylvertooth at hq.dhs.gov>


From: cps_cyber-bounces at nist.gov [mailto:cps_cyber-bounces at nist.gov] On Behalf Of Tyson Brooks
Sent: Wednesday, May 04, 2016 6:17 PM
To: aisworld at lists.aisnet.org; cps_cyber at nist.gov; IOT-M2M at listserv.ieee.org; iot-wg at eclipse.org; jca-iot at lists.itu.int
Subject: [Cps_cyber] Fwd: Call for Papers - International Journal of Internet of Things and Cyber-Assurance

INTERNATIONAL JOURNAL OF INTERNET OF THINGS AND CYBER-ASSURANCE (IJITCA)

---------------------------------------------------------------------------------
PUBLISHED BY: INDERSCIENCE PUBLISHERS
(http://www.inderscience.com/jhome.php?jcode=ijitca#moredesc)
----------------------------------------------------------------------------------

[OVERVIEW]
Wireless communication technologies are advancing at a high rate, enabling real-time multimedia and sensor services provided by mobile broadband Internet on devices creating a grid network of the Internet of Things (IoT). The IoT paradigm and machine-to-machine (M2M) communication and control are rapidly gaining ground in wireless telecommunication. IoT platforms enable heterogeneous resource discovery and data sharing through the formation of communication/virtual networks. Researchers and science-practitioners are currently envision different properties for future IoT architectures and the expectation are increasing about what the current and future generation of IoT technologies can do to enable a wide range of novel applications and organizational business models.

[OBJECTIVE]
The objective of the IJITCA is to identify and publish high-quality cyber-assurance, cyber-security and information assurance related research specifically towards the Internet of Things (IoT). IoT devices and networks may range from hand-held mobile devices to a centralized high performance cloud computing environment consisting of heterogeneous communication systems of both tactical (mobile, wireless) and fixed (wired) communications infrastructures. From an information security perspective, the IoT must address the delivery of authentic, accurate, secure, reliable, timely information, regardless of threat conditions, over these distributed and heterogeneous computing and communication systems. Cyber-assurance is the justified confidence that IoT networked systems are adequately secured to meet operational needs, even in the presence of cyber-attacks, failures, accidents and unexpected events. The IJITCA is looking to increase the visibility of current research and emergent trends in Cyber-Assurance IoT theories, applications, architectures and information security based on theoretical aspects and studies of practical applications.

[TARGET AUDIENCE]
The target audience of the IJITCA extends to researchers, professionals and students working in the field of cyber-assurance and the IoT. The journal is to gather the knowledge and experience of expert information security and IoT researchers to elicit knowledge in a collaborative effort leading to the improvement and development of security related research for the IoT. Additionally, the articles published will be written for those who want to gain and/or improve their understanding of the latest developments of  IoT.

[RESEARCH TOPICS]
Recommended research topics include, but are not limited to, the following:


  *   Cyber-threats towards the IoT
  *   Automated IoT vulnerability identification
  *   Genetic algorithms used to control intelligent agents for IoT devices
  *   Key distribution techniques in IoT networks
  *   Synchronized cyber-attacks and countermeasures against the Smart Grid and/or SCADA systems
  *   Modeling frameworks for Cyber-Physical Systems under cyber-attacks
  *   Optimal network clustering for distributed procedures in Cyber-Physical Systems
  *   Development of design methods, architectures, and implementations to minimize IoT power dissipation
  *   IoT radar component technology, including wide-bandwidth/ low-frequency antennas, high-power transmitters, high-speed signal processors, and analog-to-digital converters
  *   Design tools for integrating RF devices and components, such as inductors and optics, on IoT processing chips
  *   Methodology and techniques to improve the quality of attack indications or warnings for IoT systems
  *   Secure 6LoWPAN signal processing for IoT systems
  *   Dynamics of distributed IoT networks of embedded sensors and actuators
[SUBMISSION DETAILS]
Submissions to the journal should include the following:

  *   Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
  *   Conference papers may only be submitted if the paper has been completely re-written and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted
  *   All IJITCA articles are refereed through a double-blind process
  *   All authors must declare they have read and agreed to the content of the submitted article
  *   There are no fees for publishing with Inderscience
  *   Details on submitting your research can be found at the Inderscience Publishers author's submission site: http://www.inderscience.com/info/inauthors/author_submit.php
[EDITORIAL BOARD]
Dr. Christopher Leberknight, Montclair State University
Dr. Sergey Butakov, Concordia University of Edmonton
Dr. Utku Köse, Usak University Turkey
Dr. Martin Murillo, University of Notre Dame, USA
Dr. M. Bala Krishna, GGS Indraprastha University, India
Dr. Joon Park, Syracuse University, USA
Dr. Rasmus Ulslev Pedersen, Copenhagen Business School, Denmark
Dr. Vijendra Singh, North Cap University, India
Dr. Brij B. Gupta, National Institute of Technology, India
Dr. Angela Orebaugh, University of Virginia
Dr. Konstantinos Kotis, University of Piraeus, Greece
Dr. Dharma Agrawal, University of Cincinnati,
Dr. Esraa Alomari, University of Wasit
Dr. Rajkumar Rajasekaran, Vellore Institute of Technology
Dr. Shwadhin Sharma, California State University
Dr. Suresh Veluru, United Technologies Research Center Ireland
Dr. Singo Yamaguchi, Yamaguchi University
Dr. Honbo Zhou, UbiLink Co. Ltd.

[JOURNAL SITE]
 http://www.inderscience.com/jhome.php?jcode=ijitca

_____________________________
Dr. Tyson Brooks
Adjunct Professor
Syracuse University

EiC - International Journal of Internet of Things and Cyber-Assurance
ijitcaeditor at gmail.com<mailto:ijitcaeditor at gmail.com>





More information about the AISWorld mailing list