[AISWorld] Call for Papers - IJITCA Special Issue on Edge Computing and Fog Networks from a Cyber-Assurance Perspective

Tyson Brooks dr.tyson.brooks at ieee.org
Sat Dec 16 10:03:12 EST 2017


*** Call for Papers ***

International Journal of International Internet of Things and
Cyber-Assurance:
http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijitca

Call for Papers for a Special Issue on: “Extending the Cloud: Frameworks
and Architectures for Edge Computing and Fog Networks from a
Cyber-Assurance Perspective”

*Guest Editors*
Dr. Tyson Brooks, Syracuse University
Dr. Shiu-Kai Chin, Syracuse University
Dr. Erich Devendorf, U.S. Air Force Research Laboratory, USA
*Overview*
This special issue is looking to increase the visibility of current
research and emergent trends in cyber-assurance theory, applications and
embedded security for the Internet of Things (IoT)fog computing
architectures based on theoretical aspects and studies of practical
applications. It will focus on the security needs of the IoT/fog computing
environment, highlighting key issues and identifying the associated
security implications so that participants can readily grasp the core ideas
in this area of research. The main goal of this special issue is to bring
together research which presents recent advances and achievements
addressing the challenges related to cyber-assurance in traditional cloud,
fog, distributed, grid and wireless computing environments. Additionally,
the special issue seeks to provide academics, researchers and practitioners
with an opportunity to share their perspectives on the various aspects of
cyber-assurance research, industry best practices and pedagogical
developments of interest within the information security field. Cyber-assurance
is emerging as a paradigm for the use and delivery of automated and/or
embedded security amongst smart networks and devices. Due to the heavy
utilization of wireless technologies and the advent of innovative
technologies such as the Internet of Things (IoT), data communications and
operations are very complicated. At the same time, the pace of processing
data is significantly accelerated with the focus of how the data is
delivered to these new systems; whereas the quick shifting of the focus
will inevitably bring about swift and constant changes in the tactics of
information security. New information assurance measures are required to
secure these new infrastructures, including the use of different kinds of
automated technical defense measures and traffic monitoring and analyzing
processes and services executed within these new environments. We encourage
the submissions of papers presenting novel research and developments in
technical and related aspects on cyber-assurance. Papers may present new
concepts and approaches related to cyber-assurance, automated tools and
systems providing practical implementations supporting such methods and
approaches, and the integration and configuration of security services in
information systems architectures. In addition, we are also interested in
application papers discussing the applicability of these methods and
techniques to real-world problems. Submissions of original and unpublished
works are invited, including research, theory and applications. We invite
all authors and researchers interested cyber-assurance to share their
research and help strengthen cyber-assurance throughout the research
industry.


The issue will carry revised and substantially extended versions of
selected papers presented at the Hawaii International Conference on System
Sciences (HICSS-51), <http://hicss.hawaii.edu/>but we are also inviting
other experts to submit articles for this call.

*Subject Coverage*
Topics include, but are not limited to, the following:

   - Cyber-attacks against IoT/fog computing networks/edge devices
   - Automated IoT/fog computing vulnerability identification
   - Research on automated IoT/fog computing embedded security components
   - Genetic algorithms for IoT/fog computing devices
   - Visualization tools that support hybrid IoT/fog computing networks
   - IoT/fog computing power dissipation techniques
   - Cyber-physical systems for IoT/fog computing
   - IoT/fog computing architectures/frameworks
   - IoT radar component technology
   - IoT/fog computing sensor networking systems
   - High-frequency IoT/fog computing devices and modules

*Notes for Prospective Authors*

   - Submitted papers should not have been previously published nor be
   currently under consideration for publication elsewhere. (N.B. Conference
   papers may only be submitted if the paper has been completely re-written
   and if appropriate written permissions have been obtained from any
   copyright holders of the original paper).
   - All papers are refereed through a peer review process.
   - All papers must be submitted online. Please read our submitting
   articles page for additional information: http://www.inderscience.com/
   info/inauthors/author_submit.php
   <http://www.inderscience.com/info/inauthors/author_submit.php>.

*Important Dates*

   - Submission of manuscripts:* 1 February, 2018*
   - Notification to authors: *15 March, 2018*
   - Final versions due:* 1 April, 2018*

v/r,
Tyson

Dr. Tyson Brooks
Syracuse University
IEEE Senior Member



More information about the AISWorld mailing list