CSSIS2018: Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments |
Submission deadline | October 1, 2018 |
Call for Book Chapter
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments
Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. Historically, reliance on subtle assumptions at interface boundaries between hardware components, between hardware and software components, and between software components, as well as between a system and its operators and maintainers, has been a source of vulnerability and can be especially troublesome in these critical systems. Increasing digital device sales; increasing regulatory requirements; increasing generation and storage of digital transactions through the integration of the diverse entities within the ‘Internet of Things’ all increase the attack surface for users. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions. The tight coupling of the technologies and tools necessitates a variety of responses to address the resulting concerns. For example, malware generally uses deception to disguise what it is doing, and cybersecurity techniques such as digital forensics can be used to identify deception in technologies and the “real story” about what has occurred or will occur. Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security.
This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis and evaluation. Moreover, secure information system challenges, requirements, and methodologies will be covered. Moreover, the goal of this book is to foster novel, transformative and multidisciplinary approaches that ensure the security of current and emerging information systems by taking into consideration the unique challenges present in this environment. This book also aims to foster a research community committed to advancing research and education at the confluence of cybersecurity, privacy, and cyber-physical systems, and to transitioning its findings into engineering practice.
The book will promote research and reflect the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:
- Cybersecurity: The Current Threat and Future Challenges
- Secure Data Encryption Models
- Secure Information Systems: Challenges and Requirements
- Security Procedures for Smart Networks Applications
- Security Challenges for IoT based Applications
- Secure Interfaces, protocols and associated ad-hoc/sensor networks
- Security and fault tolerance for embedded or ubiquitous systems
- Sensor network security issues in mobile cloud computing
- Ambient intelligence and intelligent service systems in secure IoT
- Secure Geo-processing, Localization and Location Based Services
- Secure spatial data techniques and tools for analytics
- Secure Smart city services and applications platforms
- Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment
- Secure, Fast and complexity-awareness algorithms for real-time computing for network
- Scientific computing and secure data management
- Protecting Information Resources
- Threats to Information Security
- Wireless Security
- Security assurance in information systems
- Security procedures to ensure the integrity of information systems
- Recent methodologies and techniques for security in Smart Cities Applications
- Recent secure data aggregation and distribution algorithms
- Key distribution algorithms
- Protecting SCADA systems
- Securely executing multilevel transactions
- Adaptive attack mitigation for Cyber-Physical System
- Data security and privacy for Cyber-Physical System
- Security and privacy in industrial control systems
- Smart grid security
- Urban transportation system security
- Wireless sensor network security and privacy
Submission Guidelines
Submitted manuscripts should conform to the standard guidelines of Springer book chapter format. Manuscripts must be prepared using Latex, or MS Word. Prospective authors should submit their manuscripts electronically through Easychair submission system or email through this email: [ Mohamed_elhoseny@mans.edu.eg , Mohamed.elhoseny@unt.edu] Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance.
Volume Editors
Prof. Aboul Ella Hassanien: Faculty of Computers & Information, Cairo University, Egypt, Aboitcairo@gmail.com Dr. Mohamed Elhoseny: Faculty of Computers and Information, Mansoura University, Egypt, Mohamed_elhoseny@mans.edu.eg
|
Publication
CSSIS2018 will be published by series on Advanced Sciences and Technologies for Security Applications
by Springer
Contact
All questions about submissions should be emailed to mohamed_elhoseny@mans.edu.eg or mohamed.elhoseny@unt.edu