PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Workshops

The purpose of workshops is to provide a more interactive and focused platform for presenting and discussing new and emerging ideas. The format of paper presentations may include oral presentations, poster presentations, keynote lectures and panels. Depending on the number of presentations, workshops can be scheduled for 1 day or 2 days. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on CD-ROM support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

Workshop proposals are accepted until:

October 31, 2017


If you wish to propose a new Workshop please kindly fill out and submit this Expression of Interest form.

WORKSHOPS LIST

WICSPIT 2018Workshop on Innovative CyberSecurity and Privacy for Internet of Things and Enterprise Security: Strategies, Technologies and Implementations
Chair(s): Roger Hallman and Victor Chang

Workshop on
Innovative CyberSecurity and Privacy for Internet of Things and Enterprise Security: Strategies, Technologies and Implementations
 - WICSPIT 2018

Paper Submission: January 11, 2018
Authors Notification: January 25, 2018
Camera Ready and Registration: February 2, 2018

Co-chairs

Roger Hallman
Spawar Systems Center Pacific
United States
 
Victor Chang
Xi'an Jiaotong-Liverpool University
China
 
Scope

Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.



footer