PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Special Sessions

Special sessions are very small and specialized events to be held during the conference as a set of oral and poster presentations that are highly specialized in some particular theme or consisting of the works of some particular international project. The goal of special sessions (minimum 4 papers; maximum 9) is to provide a focused discussion on innovative topics. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on CD-ROM support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.


SPECIAL SESSIONS LIST

WICSPIT 2017Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
Chair(s): Roger Hallman

Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations - WICSPIT 2017

Paper Submission: February 27, 2017 (expired)
Authors Notification: March 1, 2017 (expired)
Camera Ready and Registration: March 13, 2017 (expired)


Chair

Roger Hallman
Spawar Systems Center Pacific
United States
e-mail
 
Scope

Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.


footer