Información de la conferencia
ISDDC 2017: International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
http://www.scs.ryerson.ca/iwoungan/ISDDC17/
Día de Entrega:
2017-06-25 Extended
Fecha de Notificación:
2017-07-31
Fecha de Conferencia:
2017-10-26
Ubicación:
Vancouver, British Columbia, Canada
Vistas: 9807   Seguidores: 0   Asistentes: 0

Solicitud de Artículos
 The International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017), Oct. 26-28, 2017, New York Institute of Technology (NYIT), Vancouver, BC, Canada

Scope:

The strong growth in mobile devices, pervasive networked embedded systems, and wireless sensors provides a flexible and cheap infrastructure for collecting and monitoring real-world data nearly everywhere. This is complemented by the rapid increase in information and computing power offered by computing clusters, emerging cloud systems, and information services over stationary and dynamic networks. The integration of network computing and mobile systems presents new challenges with respect to the dependability of integrated applications: accepted measures of availability, costs, and quality of service for high-bandwidth, high-quality stationary systems have to be re-thought facing possibly new dependability paradigms for cheap, resource restricted, unreliable mobile systems with low-bandwidth communication facilities. On the other hand, the proliferation of devices, which are able to directly connect to the Internet has led to a new computing and communication paradigm known as Internet of Things (IoT), where things are expected to autonomously monitor and control several aspects of our daily lives in almost all sectors such as transportation, community, home, environment, education, to name a few. At the same time, new threat vectors have emerged that leverage and magnify traditional hacking methods, enabling large scale and intelligence-driven attacks against a variety of platforms, including mobile, cloud, IoT, as well conventional networks. The consequence of such fast evolving environment is the pressing need for effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems. This conference solicits papers addressing issues related to the design, analysis, and implementation, of dependable and secure infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems.

Topics:

The conference seeks original contributions in all relevant areas, including but not limited to:

    Intelligent secure mobile systems
    Modern and Emerging Authentication Paradigms
    Digital Fraud detection, social engineering and insider threats
    Cyber threat intelligence
    Privacy, Security and Trust for Cloud, Mobile, and IoT security
    Digital forensics, Intrusion Detection, and Biometrics
    Emerging Threats, Botnet and Distributed Denial of Service (DDoS) detection and control
    Dependable Cluster/cloud/ubiquitous computing and grid Computing for mobile applications
    Dependable Distributed data mining for mobile applications
    Secure Ubiquitous Knowledge Discovery
    Applications such as cooperative mobile robots, opportunistic networks
    Cryptographic primitives for wireless and mobile security
    Security and privacy for mobile sensing systems
    Wireless or mobile security for emerging applications
    Security protocols for wireless networking
    Mobile malware and platform security
    Distributed Systems Security
    Embedded Systems Security
    Security architectures for cloud computing
    Security protocols for cloud computing
    Privacy-preserving data mining for clouds
    Identity management for cloud services
    Information sharing and data protection in the cloud
    Trust models for cloud services
    Security and Privacy of the Internet of Things
    Hardware security
    Secure computer architectures
    Embedded systems security
    Methods for detection of malicious or counterfeit hardware
    Mobile systems security
    Distributed systems security
    Intrusion and anomaly detection and prevention for mobile, cloud and IOT platforms 
Última Actualización Por Dou Sun en 2017-06-11
Conferencias Relacionadas
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
bJournal of Computer Security IOS Press0926-227X
International Journal of Child-Computer InteractionElsevier2212-8689
cInternational Journal of Information and Computer SecurityInderscience1744-1765
cIEEE Transactions on Big Data5.7IEEE2332-7790
cPersonal and Ubiquitous ComputingSpringer1617-4909
Computing3.300Springer0010-485X
International Journal of General Systems2.400Taylor & Francis0308-1079
Medical & Biological Engineering & Computing2.600Springer0140-0118
Transforming Government: People, Process and Policy2.600Emerald1750-6166
cJournal of Cybersecurity2.900Oxford University Press2057-2093
Recomendaciones