Conference Information
ISDDC 2017: International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
http://www.scs.ryerson.ca/iwoungan/ISDDC17/
Submission Date:
2017-06-25 Extended
Notification Date:
2017-07-31
Conference Date:
2017-10-26
Location:
Vancouver, British Columbia, Canada
Viewed: 6548   Tracked: 0   Attend: 0

Call For Papers
 The International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017), Oct. 26-28, 2017, New York Institute of Technology (NYIT), Vancouver, BC, Canada

Scope:

The strong growth in mobile devices, pervasive networked embedded systems, and wireless sensors provides a flexible and cheap infrastructure for collecting and monitoring real-world data nearly everywhere. This is complemented by the rapid increase in information and computing power offered by computing clusters, emerging cloud systems, and information services over stationary and dynamic networks. The integration of network computing and mobile systems presents new challenges with respect to the dependability of integrated applications: accepted measures of availability, costs, and quality of service for high-bandwidth, high-quality stationary systems have to be re-thought facing possibly new dependability paradigms for cheap, resource restricted, unreliable mobile systems with low-bandwidth communication facilities. On the other hand, the proliferation of devices, which are able to directly connect to the Internet has led to a new computing and communication paradigm known as Internet of Things (IoT), where things are expected to autonomously monitor and control several aspects of our daily lives in almost all sectors such as transportation, community, home, environment, education, to name a few. At the same time, new threat vectors have emerged that leverage and magnify traditional hacking methods, enabling large scale and intelligence-driven attacks against a variety of platforms, including mobile, cloud, IoT, as well conventional networks. The consequence of such fast evolving environment is the pressing need for effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems. This conference solicits papers addressing issues related to the design, analysis, and implementation, of dependable and secure infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems.

Topics:

The conference seeks original contributions in all relevant areas, including but not limited to:

    Intelligent secure mobile systems
    Modern and Emerging Authentication Paradigms
    Digital Fraud detection, social engineering and insider threats
    Cyber threat intelligence
    Privacy, Security and Trust for Cloud, Mobile, and IoT security
    Digital forensics, Intrusion Detection, and Biometrics
    Emerging Threats, Botnet and Distributed Denial of Service (DDoS) detection and control
    Dependable Cluster/cloud/ubiquitous computing and grid Computing for mobile applications
    Dependable Distributed data mining for mobile applications
    Secure Ubiquitous Knowledge Discovery
    Applications such as cooperative mobile robots, opportunistic networks
    Cryptographic primitives for wireless and mobile security
    Security and privacy for mobile sensing systems
    Wireless or mobile security for emerging applications
    Security protocols for wireless networking
    Mobile malware and platform security
    Distributed Systems Security
    Embedded Systems Security
    Security architectures for cloud computing
    Security protocols for cloud computing
    Privacy-preserving data mining for clouds
    Identity management for cloud services
    Information sharing and data protection in the cloud
    Trust models for cloud services
    Security and Privacy of the Internet of Things
    Hardware security
    Secure computer architectures
    Embedded systems security
    Methods for detection of malicious or counterfeit hardware
    Mobile systems security
    Distributed systems security
    Intrusion and anomaly detection and prevention for mobile, cloud and IOT platforms 
Last updated by Dou Sun in 2017-06-11
Related Conferences
Recommendation