Special sessions are very small and specialized events to be held during the conference as a set of oral and poster presentations that are highly specialized in some particular theme or consisting of the works of some particular international project. The goal of special sessions (minimum 4 papers; maximum 9) is to provide a focused discussion on innovative topics. All accepted papers will be published in a special section of the conference proceedings book, under an ISBN reference, and on digital support. All papers presented at the conference venue will be available at the SCITEPRESS Digital Library. SCITEPRESS is a member of CrossRef and every paper is given a DOI (Digital Object Identifier). The proceedings are submitted for indexation by DBLP, Web of Science / Conference Proceedings Citation Index, EI and SCOPUS.
SPECIAL SESSIONS LIST
WICSPIT 2017, Special Session on Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
Chair(s): Roger A. Hallman and Victor Chang
Special Session on Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations -
WICSPIT
2017
Paper Submission:
February 27, 2017 (expired)
Authors Notification:
March 1, 2017 (expired)
Camera Ready and Registration:
March 13, 2017 (expired)
Scope
Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.