[AISWorld] Call for Papers: International Journal of Internet of Things and Cyber-Assurance

Tyson Brooks dr.tyson.brooks at ieee.org
Fri Dec 31 14:37:35 EST 2021


Hello Colleagues -

Happy New Year and all the best for a safe and prosperous 2022!

Please see the attached call for papers below. Feel free to distribute to
your students/colleagues who may also be interested in publishing any of
their IoT, cybersecurity, or cyber-assurance research.

*International Journal of Internet of Things and Cyber-Assurance:  *
https://www.inderscience.com/jhome.php?jcode=ijitca
<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.inderscience.com%2Fjhome.php%3Fjcode%3Dijitca&data=04%7C01%7Cttbrook%40uwe.nsa.gov%7C4c336b5227fa4906955408d9b4f16762%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637739771190306994%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=Gvuayyop3ZY7axBvM80HxAFAHR5iw9Q06UcyaQE9OGg%3D&reserved=0>
Inderscience Publishers

*Journal Overview*
The Internet of Things (IoT) must address the reliable and timely delivery of
information, regardless of cyber-threats, using secure automatic processes
over distributed and heterogeneous computing systems. The IJITCA provides
an embedded security, information assurance and cyber-security research
perspective, illustrating how cyber-assurance must integrate with IoT
devices and networks to understand how these individual components interact
in ways to resist and avoid intentional attempts to compromise normal
operations. The IJITCA addresses the protection of IoT networks from mobile
devices to complex processing systems. Vol.1 No. 1 is free of charge and
can be accessed at the following location:
http://www.inderscience.com/info/inarticletoc.php?jcode=ijitca&year=2018&vol=1&issue=1
<https://gcc02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.inderscience.com%2Finfo%2Finarticletoc.php%3Fjcode%3Dijitca%26year%3D2018%26vol%3D1%26issue%3D1&data=04%7C01%7Cttbrook%40uwe.nsa.gov%7C4c336b5227fa4906955408d9b4f16762%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637739771190316946%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=k%2BVSVXxjyoIeHkl9zLvGeT49YkfBu1nxroV5tD4Y%2FCo%3D&reserved=0>
.

Recommended topics include, but are not limited to, the following:

-5G/IoT/Edge/SDN security architectures and designs
-Vulnerabilities and exploits in 5G/IoT/Edge/SDN architectures
-Research on automated 5G/IoT/Edge/SDN computing vulnerability assessment
and intrusion detection tools and techniques
-Genetic algorithms used to spawn and control intelligent agents for
information
assurance for  IoT/Edge/Fog computing devices
-Network management and visualization tools that support real time planning
and control of tactical nets as well as tools for intrusion detection and
forensic analysis in hybrid IoT/Edge/Fog computing networks
-IoT artificial intelligence (A.I)/ machine learning (M.L.) computing
frameworks which allow diverse input data streams to be transformed into a
unified information fusion space for processing using more unified and
tractable procedures
-Development of secure design methods, architectures, and implementations
to minimize 5G/IoT/Edge/SDN computing power dissipation
-5G/IoT/Edge/SDN computing sensor networking systems, including signal
processing
and communications interactions, distributed detection and estimation, and
networking protocols
-High frequency 5G/IoT/Edge/SDN computing devices and modules to
enhance situational
analysis and increase the communication functionality

*Paper Submissions*
Submitted articles should not have been previously published or be currently
under consideration for publication elsewhere. Conference papers may only
be submitted if the paper has been completely re-written and the author has
cleared any necessary permissions with the copyright owner if it has been
previously copyrighted. Briefs and research notes are not published in this
journal. All our articles go through a double-blind review process. All
authors must declare they have read and agreed to the content of the
submitted article. A full statement of our Ethical Guidelines for Authors
(PDF) is available here:
https://www.inderscience.com/www/dl.php?filename=authorethics.pdf
<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.inderscience.com%2Fwww%2Fdl.php%3Ffilename%3Dauthorethics.pdf&data=04%7C01%7Cttbrook%40uwe.nsa.gov%7C4c336b5227fa4906955408d9b4f16762%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637739771190316946%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=CCq3R0QeWcNg0TjysAOFepIcRfwll0%2FvzbcUJ3rBVSs%3D&reserved=0>
.

There are no charges for publishing with Inderscience, unless you require
your article to be Open Access (OA). All articles for the IJITCA must be
submitted using their online submissions system:
https://www.inderscience.com/mobile/inauthors/index.php?pid=73
<https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.inderscience.com%2Fmobile%2Finauthors%2Findex.php%3Fpid%3D73&data=04%7C01%7Cttbrook%40uwe.nsa.gov%7C4c336b5227fa4906955408d9b4f16762%7Cd61e9a6ffc164f848a3e6eeff33e136b%7C0%7C0%7C637739771190316946%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=8%2BB2allMPdQCmMafjBqxUKPqhZDMIRwwqloN1gKf6Nk%3D&reserved=0>
.

Dr. Tyson Brooks
Adjunct Professor
Syracuse University

Editor-in-Chief
International Journal of the Internet of Things and Cyber-Assurance
ijitcaeditor at gmail.com


More information about the AISWorld mailing list