€750.30 – €854.85

WICSPIT 2018 - Workshop on Innovative CyberSecurity and Privacy for Interne...

Event Information

Share this event

Date and Time

Location

Location

Vila Galé Santa Cruz

Rua São Fernando, 5

9100-173 Santa Cruz

Portugal

View Map

Refund Policy

Refund Policy

No Refunds

Friends Who Are Going
Event description

Description

Workshop on Innovative CyberSecurity and Privacy for Internet of Things - WICSPIT 2018

19 - 21 March, 2018 - Funchal, Madeira, Portugal

In conjunction with the 3rd International Conference on Internet of Things, Big Data and Security - IoTBDS 2018


SCOPE


Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill attack in 2014, the Ukrainian Power Grid attack in 2015, the Mirai Botnet DDoS attacks of 2016 and onward, increasing ransomware attacks, etc.). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information. Ransomware has emerged in the public consciousness after multiple high-profile attacks, and many experts forecast that it will become a major threat to IoT and critical infrastructure in the very near future.

As cyber-events increase in number and severity, security engineers must incorporate innovative cybersecurity strategies and technologies to safeguard their systems and confidential information. A strategy to address a cybersecurity vulnerability, once identified, must understand the nature of the vulnerability and how to mitigate it. The “security tax” or “privacy tax” (system and service degradation) caused by the implementation of the mitigating security technologies may be so great that the end user bypasses the technologies and processes meant to ensure the system’s security and privacy. A practical reality of the adoption of IoT is that it will require integration of new technologies with existing systems and infrastructure, which will continue to expose new security and privacy vulnerabilities; re-engineering may be required. The human element of IoT, the user, must be considered, and how the user and the IoT system interact to optimize system security and user privacy must be defined. Cyber-attackers and cyber-victims are often in different countries, the transnational nature of many cyber-events necessitate the consideration of public policy and legal concerns as well.

This workshop aims to showcase new and emerging strategies and technologies for forecasting, mitigating, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT. Additionally, we invite arguments for innovative and off-the-wall solutions that have sound academic backing. The institutional benefits of IoT adoption are clear, however security and privacy concerns are constantly coming to light. As organizations—both public and private, large and small—adopt new IoT technologies, we hope that this forum can serve as an opening conversation between government, industry, and academia for the purpose of addressing those concerns.



Topics of Interest

Topics of interest include (but are not limited to):
Cybersecurity and Privacy approaches
  • Honeypots, Honeynets and Honeypatches
  • Deception-based approaches
  • Encrypted Computing and Secure Computation
  • Active and Passive Cybersecurity
  • Firmware vetting
  • Privacy-Enhancing Technologies
  • Intelligence and Counter-Intelligence
  • Security and Privacy Engineering
Cyber-security Settings
  • Cybersecurity and Privacy in Cyber-Physical Systems
  • Industrial Internet
  • The Intersection of IoT, Social Media and other Pervasive Computing Platforms, and Enterprise Security
  • Smart Cities
  • Cyber-Physical Power Systems
Data analytics for cybersecurity
  • Predictive Cybersecurity
  • Event Analysis
  • Event Attribution and Cyber-Forensics
Cybersecurity metrics
  • Security and Privacy Metrics and Analysis
  • Metrics of defense effectiveness
  • Quantifying the ‘security/privacy tax’
Human/Societal issues
  • Legal and Policy Topics related to Cybersecurity and Privacy
  • Human Factors in Cybersecurity and Privacy
  • Inter-Organizational Cyber-Threat Information Sharing
Other topics
  • Integration of New Technology into Existing Systems
  • Situational Awareness
  • System Situational Awareness
  • Emerging Threats
  • Malware Analysis
  • Event Recovery
  • Security as a Service (SaaS)
  • Privacy as a Service (PaaS)



IMPORTANT DATES

Paper Submission: January 11, 2018
Authors Notification: January 25, 2018
Camera Ready and Registration: February 2, 2018



WORKSHOP PROGRAM COMMITTEE

An Braeken, Vrije Universiteit Brussel, Belgium
Ishbel Duncan, University of St. Andrews, United Kingdom
Jaclyn Kerr, Stanford University; Lawrence Livermore National Laboratory, United States
Xenofon Koutsoukos, Vanderbilt University, United States
Devu MANIKANTAN, United Technologies Research Center, United States
Giovanni Pau, Kore University of Enna, Italy
Kurt Rohloff, New Jersey Institute of Technology, United States
Paulo Simoes, University of Coimbra, Portugal
Pawel Szalachowski, Singapore University of Technology and Design, Singapore



CO-CHAIRS

Roger Hallman
Spawar Systems Center Pacific
United States

Brief Bio
Mr. Roger Hallman is a Cybersecurity Research Scientist in the Cybersecurity Science and Technology Branch at SPAWAR Systems Center Pacific in San Diego, Ca. His research interests include cybersecurity – particularly within the IoT domain, data privacy, encrypted computing, and decision support, as well as technology transition and adoption. Since joining SPAWAR Systems Center Pacific in 2014, he has become a prolific author and co-author of many internal as well as peer-reviewed publications. He also has multiple patent applications currently pending. He routinely supports inter-agency programs within the United States Department of Defense by participating in proposal review and source selection committees as well as providing technical oversight of funded research efforts. He also sits on the Advisory Board to The Cybersecurity Research Center at the New Jersey Institute of Technology. He is currently working on research in energy system cybersecurity funded by the Office of Naval Research.


Victor Chang
Xi'an Jiaotong-Liverpool University
China

Brief Bio
Victor Chang is an Associate Professor (Reader) in Information Management and Information Systems of International Business School Suzhou, Xi'an Jiaotong Liverpool University, China. He's also a Director of PhD Program. He was previously a Senior Lecturer in the School of Computing, Creative Technologies at Leeds Beckett University, UK. He’s a Visiting Researcher at the University of Southampton, UK and an Honorary Associate Professor at the University of Liverpool, UK. He is an expert on Cloud Computing and Big Data in both academia and industry with extensive experience in related areas since 1998. He completed a PGCert (Higher Education) and PhD (Computer Science) within four years while working full-time. He has over 100 peer-reviewed published papers. He won £20,000 funding in 2001 and £81,000 funding in 2009. He was involved in part of the £6.5 million project in 2004, part of the £5.6 million project in 2006 and part of a £300,000 project in 2013. He won a 2011 European Identity Award in Cloud Migration, since his work is making contributions. He has won 2016 European Identity and Cloud Award on the best project in research, involved with more than 20 collaborators worth more than $10 millions in valuation. He was selected to present his research in the House of Commons in 2011 and won the best paper in 2012 and 2015. He has demonstrated Storage as a Service, Health Informatics as a Service, Financial Software as a Service, Education as a Service, Big Data Processing as a Service, Integration as a Service, Security as a Service, Social Network as a Service, Data Visualization as a Service (Weather Science) and Consulting as Service in Cloud Computing and Big Data services in both of his practitioner and academic experience. His proposed frameworks have been adopted by several organizations. He is the founding chair of international workshops in Emerging Software as a Service and Analytics and Enterprise Security. He is the founding chair of IoTBDS and COMPLEXIS which have become popular in research communities. He is an Editor-in-Chief (EIC) in International Journal of Organizational and Collective Intelligence and a founding EIC in Open Journal of Big Data. He is the Editor of a highly prestigious journal, Future Generation Computer Systems (FGCS). He is a reviewer of numerous well-known journals and had published three books on Cloud Computing which are available on Amazon website. He is a keynote speaker for CLOSER 2015/WEBIST2015/ICTforAgeingWell 2015 and has received positive support. Dr. Victor has given or will give 10 international keynotes since the end of Year 2016. He has won the Outstanding Young Scientist of Year 2017 this February.






SCOPE


The internet of things (IoT) is a platform that allows a network of devices (sensors, smart meters, etc.) to communicate, analyse data and process information collaboratively in the service of individuals or organisations. The IoT network can generate large amounts of data in a variety of formats and using different protocols which can be stored and processed in the cloud. The conference looks to address the issues surrounding IoT devices, their interconnectedness and services they may offer, including efficient, effective and secure analysis of the data IoT produces using machine learning and other advanced techniques, models and tools, and issues of security, privacy and trust that will emerge as IoT technologies mature and become part of our everyday lives.

Big Data (BD) has core values of volume, velocity, variety and veracity. After collecting much data from IoT, BD can be jointly used with machine learning, AI, statistical and other advanced techniques, models and methods, which can create values for people and organizations adopting it, since forecasting, deep analysis and analytics can help identify weaknesses and make improvements based on different analysis.

Maintaining a high level of security and privacy for data in IoT are crucial and we welcome recommendations, solutions, demonstrations and best practices for all forms of security and privacy for IoT and BD.




CONFERENCE AREAS

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

1. BIG DATA RESEARCH
2. EMERGING SERVICES AND ANALYTICS
3. INTERNET OF THINGS (IOT) FUNDAMENTALS
4. INTERNET OF THINGS (IOT) APPLICATIONS
5. BIG DATA FOR MULTI-DISCIPLINE SERVICES
6. SECURITY, PRIVACY AND TRUST
7. IOT TECHNOLOGIES




AREA 1: BIG DATA RESEARCH


  • Big Data fundamentals - Services Computing, Techniques, Recommendations and Frameworks
  • Modeling, Experiments, Sharing Technologies & Platforms
  • SQL/NoSQL databases, Data Processing Techniques, Visualization and Modern Technologies
  • Analytics, Intelligence and Knowledge Engineering
  • Data Center Enabled Technologies
  • Sensor, Wireless Technologies, APIs
  • Networking and Social Networks
  • Data Management for Large Data
  • Security, Privacy and Risk
  • Software Frameworks (MapReduce, Spark etc) and Simulations
  • Modern Architecture
  • Volume, Velocity, Variety, Veracity and Value
  • Social Science and Implications for Big Data



AREA 2: EMERGING SERVICES AND ANALYTICS


  • Health Informatics as a Service (HIaaS) for any Type of Health Informatics, Computation and Services
  • Big Data as a Service (BDaaS) including Frameworks, Empirical Approaches and Data Processing Techniques
  • Big Data Algorithm, Methodology, Business Models and Challenges
  • Security as a Service including any Algorithms, Methodology and Software Proof-of-concepts
  • Financial Software as a Service (FSaaS) including Risk and Pricing Analysis; Predictive Modeling
  • Education as a Service (EaaS) including e-Learning and Educational Applications
  • Business Process as a Service (BPaaS) including Workflows and Supply Chain in IoT and Big Data
  • Software Engineering Approaches, including Formal Methods, Agile Methods and Theoretical Algorithms for IoT and Big Data
  • Natural Science as a Service (NSaaS) including Weather Forecasting and Weather Data Visualization
  • System Design and Architecture
  • Mobile APIs, Apps, Systems and Prototype
  • Gaming as a Service (GaaS)
  • Framework (conceptual, logical or software)
  • Analytics as a Service (AaaS) for any Types of Analytics
  • Electronic, Logic, Robotic and Electrical Infrastructure, Platforms and Applications
  • Energy-saving and Green IT Systems or Applications
  • Middleware and Agents for IoT and Big Data, Grid and Cluster Computing
  • Integration as a Service (data; service; business; federated IoT and Big Data)
  • Scheduling, Service Duplication, Fairness, Load Balance for SaaS and Analytics
  • Tenant Application Development including Customization, Verification, Simulation, and testing on SaaS and Analytics
  • IaaS, PaaS and SaaS quality of service (QoS), security, reliability, availability, service bus mechanisms
  • Social Networks and Analytics
  • User Evaluations and Case Studies
  • IaaS, PaaS and SaaS, Big Data and Analytics demonstrations and Research Discussions from Computing Scientists, Business IS Academics and Industrial Consultants
  • Wireless Systems and Applications
  • e-Government, e-Commerce, e-Science and Creative Technologies for IoT and Big Data
  • Data as a Service and Decision as a Service
  • IoT Services and Applications
  • New Service Models
  • Software Engineering for Big Data Analytics
  • SOA based approaches to IoT BD
  • Social informatics, challenges and recommendations for IoT
  • Any emerging services



AREA 3: INTERNET OF THINGS (IOT) FUNDAMENTALS


  • Network Design and Architecture
  • Software Architecture and Middleware
  • Mobile Services
  • Data and Knowledge Management
  • Context-awareness and Location-awareness
  • Security, Privacy and Trust
  • Performance Evaluation and Modeling
  • Networking and Communication Protocols
  • Machine to Machine Communications
  • Intelligent Systems for IoT and Services Computing
  • Energy Efficiency
  • Social Implications for IoT
  • Future of IoT and Big Data



AREA 4: INTERNET OF THINGS (IOT) APPLICATIONS


  • Technological focus for Smart Environments
  • Next Generation Networks
  • Smart City Examples and Case Studies
  • Data Analysis and Visualization for Smart City, Green Systems and Transport Systems
  • Architecture for secure and interactive IoT
  • Intelligent Infrastructure and Guidance Systems
  • Traffic Theory, Modeling and Simulation
  • Sensor Networks, Remote Diagnosis and Development
  • Transportation Management
  • Pattern Recognition and Behavioral Investigations for Vehicles, Green Systems and Smart City



AREA 5: BIG DATA FOR MULTI-DISCIPLINE SERVICES


  • Smart City and Transportation
  • Education and Learning
  • Business, Finance and Management
  • Large-scale Information Systems and Applications
  • Energy, Environment and Natural Science Applications
  • Social Networks Analysis, Media and e-Government
  • Proofs-of-concepts and Large-scale Experiments
  • Risk Modeling, Simulation, Legal Challenges
  • Open data: Issues, Services and Solutions
  • Earth Science Simulation and Processing
  • GPUs and Visualization
  • Case Studies of Real Adoption
  • Biomedical Experiments and Simulations
  • Healthcare Services and Health Informatics
  • Cancer and Tumor Studies with Big Data
  • DNA Sequencing, Organ Simulations and Processing
  • Volume, Velocity, Variety and Veracity
  • HCI and Gaming



AREA 6: SECURITY, PRIVACY AND TRUST


  • Algorithms, software engineering and development
  • System design and implementation
  • Testing (software engineering; penetration; product development)
  • Encryption (all aspects)
  • Firewall, access control, identity management
  • Experiments of using security solutions and proof-of-concepts
  • Large-scale simulations in the Cloud, Big Data and Internet of Things
  • Intrusion and detection techniques
  • Social engineering and ethical hacking: techniques and case studies
  • Software engineering for security modeling, business process modeling and analytics
  • Trust and privacy
  • Location-based privacy
  • Data security, data recovery, disaster recovery
  • Adoption challenges and recommendation
  • Information systems related issues
  • Conceptual frameworks and models
  • Emerging issues and recommendations for organizational security
  • E-Commerce and online banking
  • Social network analysis, emerging issues in social networks
  • Education and e-Learning
  • Surveys and their quantitative analysis
  • Architecture (technical or organizational)
  • Case Studies



AREA 7: IOT TECHNOLOGIES


  • 3D Printing
  • Artificial Intelligence
  • Biotechnology
  • Communication
  • Data Processing
  • Electronic Technologies for in-vehicle
  • Internet of Things
  • Mode-to-Mode Systems
  • Nanotechnology
  • Sensors
  • Transport Safety and Mobility
  • Vehicle-to-Infrastructure
  • Vehicle-to-Vehicle



KEYNOTE SPEAKERS

Tobias Hoellwarth, EuroCloud Europe, Austria
Péter Kacsuk, MTA SZTAKI, Hungary






----------
AGENDA
----------



Program




Please contact the event manager Marilyn (marilyn.b.turner(at)nyeventslist.com ) below for:
- Multiple participant discounts
- Price quotations or visa invitation letters
- Payment by alternate channels (PayPal, check, Western Union, wire transfers etc)
- Event sponsorships

NO REFUNDS ALLOWED ON REGISTRATIONS
Service fees included in this listing.
-----------------------------------------------------------------
This event is brought to you by:
INSTICC - NewYorkEventsList
http://www.NyEventsList.com
http://www.BostonEventsList.com
http://www.SFBayEventsList.com
-----------------------------------------------------------------

MYL171115CEV
Share with friends

Date and Time

Location

Vila Galé Santa Cruz

Rua São Fernando, 5

9100-173 Santa Cruz

Portugal

View Map

Refund Policy

No Refunds

Save This Event

Event Saved