[AISWorld] Information Systems Frontier CfP: Mitigating Cyber Threats and Defense in Data Intensive Smart Cities

Raymond Choo raymond.choo at fulbrightmail.org
Fri Apr 20 12:18:44 EDT 2018


*Information Systems Frontiers, 2016 Impact Factor: 2.521 (Quartile 1;
Ranks 20/104)*

*Special issue on: Mitigating Cyber Threats and Defense in Data Intensive
Smart Cities*

http://organ-assoc.business.utsa.edu/isfrontiers/forthcoming1/CFP%20SI_Cybersecurity_ISF%20v3.4.pdf



This special issue will focus on the research, development and application
of these foundations, particularly on the scientific foundations,
technologies, and practices from different disciplines and countries that
can improve the security and dependability of complex systems in smart
cities. This special issue solicits cutting-edge research from both
academia and industry, with an emphasis on novel techniques and tools to
perceive, reason, learn and act on a wide range of data collected from
different (attempted) attacks, sophisticated advanced persistent threat
campaigns, etc; as well as bringing together solutions from different
disciplines to address the underpinning cyber security threats.



Topic of interest relating to smart cities (e.g. smart grids, intelligent
systems and technology, and critical information infrastructure) include,
but are not limited to the following:

·        Big data analytics for cyber threat identification and/or cyber
security mitigation in smart cities and related concepts and technologies
such as smart grids, intelligent systems and technology, and critical
information infrastructure

·        Behavioral security for cyber threat identification and/or cyber
security mitigation in smart cities and related concepts and technologies

·        Context aware data security in smart cities and related concepts
and technologies

·        Cyber defense in intelligence systems and technologies for smart
cities

·        Cyber forensics or cyber intelligence for smart cities and related
concepts and technologies

·        Cyber security, system security and information security for smart
cities and related concepts and technologies

·        Cyber threats and protection in smart cities and related concepts
and technologies

·        Cyber threats and hunting in smart cities and related concepts and
technologies

·        Secure and efficient implementation of cryptographic algorithms,
including post-quantum cryptography, in smart cities and related concepts
and technologies

·        Security frameworks, architectures and protocols, particularly
lightweight solutions, for IoT nodes in smart cities

·        Security, privacy and trust issues in IoT, cloud, fog, big data,
social networks, and other contemporary technologies relating to smart
cities

·        Security, privacy and trust management in IoT, cloud, fog, big
data, social networks, and other contemporary technologies relating to
smart cities

·        Social-legal aspects of cyber security (e.g. legal liability of
security breaches)



*Submission details:*



The author instructions for preparation of manuscripts can be found at
the Information
Systems Frontiers
<http://www.springer.com/business+%26+management/business+information+systems/journal/10796>
journal web page Author Guidelines web page. Articles which have been
previously published at a conference needs to have at least 50% new
material as clarified in the cover letter of the submission. Manuscript
must be submitted online using the following URL:
https://www.editorialmanager.com/isfi/default.aspx, and the authors need to
select "Special Issue: Cyber_Smart_Cities" during the submission process.



Authors of selected high quality papers from the 17th IEEE International
Conference on Trust, Security and Privacy in Computing and Communications
(IEEE TrustCom 2018) relevant to this special issue, will be invited to
submit an extended paper for consideration in this special issue. Each
selected paper must be substantially extended, with at least 60% difference
from its conference version.



*Timeline:*



Submission deadline: November 30, 2018

First round of reviews due (accept/reject notification): January 30, 2019

Second round of reviews due: March 30, 2019

Final acceptance: June 30, 2019

Camera-ready version due: July 30, 2019

Publication: Late 2019



*Guest editors:*



Kim-Kwang Raymond Choo, Ph.D.

Department of Information Systems and Cyber Security

The University of Texas at San Antonio, USA

Email: Raymond.Choo at fulbrightmail.org



Deepak Puthal, Ph.D.

School of Electrical and Data Engineering

University of Technology Sydney, Australia

Email: Deepak.Puthal at uts.edu.au



Zhechao Charles Liu, Ph.D.

Department of Information Systems and Cyber Security

The University of Texas at San Antonio, USA

Email: Charles.Liu at utsa.edu



Chonggang Wang, Ph.D., IEEE Fellow

Innovation Labs, Interdigital Communications, USA

Email: drchongwang at gmail.com




*Dr. Kim-Kwang Raymond Choo FACS, SMIEEE*Cloud Technology Endowed
Professorship, Department of Information Systems and Cyber Security
Courtesy Appointment, Department of Electrical and Computer Engineering

The University of Texas at San Antonio
One UTSA Circle, San Antonio, TX 78249-0631, USA
Office: NPB 3.356, Tel: 210 458 7876

Google Scholar:
*https://scholar.google.com/citations?hl=en&user=rRBNI6AAAAAJ*
<https://scholar.google.com/citations?hl=en&user=rRBNI6AAAAAJ>



More information about the AISWorld mailing list