[AISWorld] HICSS-53 *Call for Papers* - Cyber-Assurance for the IoT, SDN and Fog Computing Architectures

Tyson Brooks dr.tyson.brooks at ieee.org
Fri May 17 07:50:38 EDT 2019


*Call for Papers for the Hawaii International Conference on System
Sciences–53 (HICSS-53), **January 7-10, 2020: Grand Wailea, Maui *


*Mini-Track: Cyber-Assurance for Internet of Things, Software-Defined
Networks and Fog Computing Architectures*


*Minitrack Chairs: *

Dr. Tyson Brooks, Syracuse University

Dr. Shiu-Kai Chin, Syracuse University

The Hawaii International Conference on System Sciences (HICSS) – has been
known worldwide as one of the longest standing scientific communities in
the information systems and technology fields. Since 1968, it has become a
respected destination that attracts high-caliber scholars and professionals
in academia, industry and government agencies around the world to discuss
their cutting-edge research.

The objective of this mini-track is to increase the visibility of current
research and emergent trends in Cyber-Assurance theory, application,
embedded security and machine-learning for the Internet of Things (IoT),
software-defined networks (SDN)/network function virtualization (NFV) and
Fog computing architectures based on theoretical aspects and studies of
practical applications. Cyber-assurance is the justified confidence that
networked systems are adequately secure to meet operational needs, even in
the presence of attacks, failures, accidents and unexpected events.
Cyber-assurance means that IoT systems, smart internet connected devices
(ICD) and networks provide the opportunity of automatically securing
themselves against cyber-attacks. The difference is that the concept of
cyber-assurance must provide embedded, secure microchips/processors in ICD
devices and virtual networks that can continue to operate correctly even
when subjected to an attack.



IoT devices using SDN/NFV and Fog computing systems and networks should be
able to resist the various security cyber-attacks such as hacking of
networks, devices, theft of information, disruption, etc. and be able to
continue performing under severe environmental conditions. Through embedded
processors and machine learning algorithms over the transmitted
information, the miscoding and leaking of information during transmission
channels has to monitor any loss, miscoding and leaking of data. Timely
adjustments of information with falling quality and automatic switching to
the best routing IoT systems by making uses of multi-directional routing is
also warranted. Cyber-assurance will need to provide the principles and
technologies to unify these systems to deliver the end-state goal of secure
IoT systems for greatly enhanced interoperability, scalability,
performance, and agility.



The target audience of this mini-track will be composed of researchers,
professionals and students working in the field of cyber-security, wireless
technologies, information system theory, systems engineering, information
security architecture and security system design along with university
professors and researchers involved in information assurance,
cyber-security, IoT, SDN/NFV and Fog computing related networking. Through
the research identified for this track, graduate students, researchers and
academics who want to improve contribute their understanding of the latest
security developments for the IoT, SDN/NFV and Fog computing. This
mini-track will focus on the security needs of these environments,
highlighting key issues and identifying the associated security
implications so that the general participates can readily grasp the core
ideas in this area of research. Recommended topics for this track include,
but are not limited to, the following:

   -  Hacking against IoT/Fog computing networks/devices
   -  SDN/NFV security architectures and designs
   -  Vulnerabilities and exploits in SDN/NFV architectures
   -  Automated IoT/Fog computing vulnerability identification,
   -  Research on automated IoT/Fog computing vulnerability assessment and
   intrusion detection tools and techniques
   - Genetic algorithms used to spawn and control intelligent agents for
   information assurance for IoT/Fog computing devices
   - Network management and visualization tools that support real time
   planning and control of tactical nets as well as tools for intrusion
   detection and forensic analysis in hybrid IoT/Fog computing networks
   - IoT/Fog Computing frameworks which allow diverse input data streams to
   be transformed into a unified information fusion space for processing using
   more unified and tractable procedures
   - Development of secure design methods, architectures, and
   implementations to minimize IoT/Fog computing power dissipation
   - IoT/Fog Computing sensor networking systems, including signal
   processing and communications interactions, distributed detection and
   estimation, and networking protocols,
   - High frequency IoT/Fog Computing devices and modules to enhance
   situational analysis and increase the communication functionality



*Important Dates for Paper Submissions*
**April 15, 2019:* Paper Submission System Opens
**June 15, 2019* | 11:59 pm HST: Paper Submission Deadline
**August 17, 2019*: Notification of Acceptance/Rejection
**September 22, 2019*: Deadline for Authors to Submit Final Manuscript for
Publication
**October 1, 2019*: Deadline for at least one author of each paper to
register for HICSS-53


*PAPER SUBMISSION * Authors are invited to submit papers electronically in
PDF format. Submitted manuscripts should be structured as technical papers
and may not exceed 10 letter-size (8.5 x 11) pages including all figures,
tables and references.

Submissions not conforming to these guidelines may be returned without
review. The official language of the conference is English. All manuscripts
will be reviewed and judged on technical strength, originality,
significance, quality of presentation, and interest and relevance to the
conference attendees.  The proceedings will be published through HICSS
conference proceedings. Submitted papers must represent original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines will be
rejected without review and further action may be taken, including (but not
limited to) notifications sent to the heads of the institutions of the
authors and sponsors of the conference. Submissions received after the due
date, exceeding the page limit, or not appropriately structured may not be
considered.

*PUBLICATION*

Proceedings will be published through the HICSS-53 conference proceedings.
Papers submitted could be accepted as REGULAR papers (10 pages) or SHORT
papers (6 pages), depending on the review scores.

*FAST TRACK JOURNAL OPPORTUNITY*

Authors of papers accepted for presentation in the mini-track will be
offered the opportunity to submit an extended  version of their papers for
consideration for fast-track publication in the International Journal of
Internet of Things and Cyber-Assurance [IJITCA] (
http://www.inderscience.com/jhome.php?jcode=ijitca).





* For more details: http://hicss.hawaii.edu/ <http://hicss.hawaii.edu/> Or,
contact the Minitrack Co-Chairs: *Tyson Brooks (Primary Contact)
Syracuse University
ttbrooks at syr.edu


Shiu-Kai Chin
Syracuse University
skchin at syr.edu



More information about the AISWorld mailing list