Home      Log In      Contacts      FAQs      INSTICC Portal
Special Session on
Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
 - WICSPIT 2017

24 - 26 April, 2017 - Porto, Portugal

Within the 2nd International Conference on Internet of Things, Big Data and Security - IoTBDS 2017

WICSPIT is a shared event between IoTBDS and SMARTGREENS.


Roger A. Hallman
14 Engineering Drive, Thayer School of Engineering, Dartmouth College & Naval Information Warfare Center (NIWC) Pacific
United States
Brief Bio
Roger A. Hallman is a Computer Security Researcher at the Naval Information Warfare Center (NIWC) Pacific, as well as a Doctoral Candidate in Dartmouth College's Thayer School of Engineering; he is a recipient of the United States Department of Defense SMART Scholarship. His current research focuses on distributed secure computation, cybersecurity, and machine learning. His previous research was in Applied Homomorphic Encryption, Malware Analysis, Cybersecurity for Industrial Control Systems, Cybersecurity Decision Support, and Cloud Service Resilience.
Victor Chang
Department of Operations and Information Management, Aston Business School, Aston University
United Kingdom
Brief Bio
Prof. Victor Chang is a Professor of Business Analytics at Operations and Information Management, Aston Business School, Aston University, UK, since mid-May 2022. He was previously a Full Professor of Data Science and Information Systems at the School of Computing, Engineering and Digital Technologies, Teesside University, UK, since September 2019. He was previously a Senior Associate Professor, Director of Ph.D. and Director of MRes at International Business School Suzhou, Xi’an Jiaotong-Liverpool University, China. He was also a very active contributing key member at the Research Institute of Big Data Analytics, XJTLU. Before that, he worked as a Senior Lecturer at Leeds Beckett University, UK. Within 4 years, Prof Chang completed Ph.D. (CS, Southampton) and PGCe rt (Higher Education, Fellow, Greenwich) while working for several projects at the same time. Before becoming an academic, he has achieved 97% on average in 27 IT certifications. He won 2001 full Scholarship, a European Award on Cloud Migration in 2011, IEEE Outstanding Service Award in 2015, best papers in 2012, 2015 and 2018, the 2016 European award: Best Project in Research, 2016-2018 SEID Excellent Scholar, Suzhou, China, Outstanding Young Scientist award in 2017, 2017 special award on Data Science, 2017-2022 INSTICC Service Awards, Talent Award Suzhou 2019, Top 2% Scientist 2019-2022, Highly Cited Researcher 2021, Outstanding Reviewer of several Elsevier journals 2018-2019 and Outstanding Editor of FGCS (stepped down). He is the Associate Editor of IEEE TII, JGIM, Expert Systems and IJBSR and an Editor of Information Fusion, Scientific Report and IDD journals. He is the Editor-in-Chief of IJOCI and OJBD journals, and holds important or lead guest editor roles in several prestigious journals. Prof Chang was involved in different projects worth more than £14 million in Europe and Asia. He has published 3 books as sole author and the editor of 2 books on Cloud Computing and related technologies. He gave 48 keynotes at international conferences. He is widely regarded as one of the most active and influential young scientists and experts in IoT/Data Science/Cloud/Security/AI/IS, as he has the experience to develop 10 different services for multiple disciplines. He is the founding conference chair for IoTBDS, COMPLEXIS and FEMIB to build up and foster active research communities globally with positive impacts.


Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.
As cyber-events increase in number and severity, security engineers must incorporate innovative cybersecurity strategies and technologies to safeguard their systems and confidential information. A strategy to address a cybersecurity vulnerability, once identified, must understand the nature of the vulnerability and how to mitigate it. The “security tax” or “privacy tax” (system and service degradation) caused by the implementation of the mitigating security technologies may be so great that the end user bypasses the technologies and processes meant to ensure the system’s security and privacy. A practical reality of the adoption of IoT is that it will require integration of new technologies with existing systems and infrastructure, which will continue to expose new security and privacy vulnerabilities; re-engineering may be required. The human element of IoT, the user, must be considered, and how the user and the IoT system interact to optimize system security and user privacy must be defined. Cyber-attackers and cyber victims are often in different countries, the transnational nature of many cyber-events necessitate the consideration of public policy and legal concerns as well.
This special session aims to showcase new and emerging strategies and technologies for forecasting, mitigating, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT. The institutional benefits of IoT adoption are clear, however security and privacy concerns are constantly coming to light. As organizations—both public and private, large and small—adopt new IoT technologies, we hope that this special session can serve as an opening conversation between government, industry, and academia for the purpose of addressing those concerns.

Topics of Interest

Topics of interest include (but are not limited to):
Cyber–security approaches
  • Honeypots, Honeynets and Honeypatches
  • Deception-based approaches
  • Encrypted Computing and Secure Computation
  • Active and Passive Cybersecurity
  • Firmware vetting
  • Privacy-Enhancing Technologies
  • Intelligence and Counter-Intelligence
  • Security and Privacy Engineering
Cyber-security Settings
  • Cyber-Security and Privacy in Cyber-Physical Systems
  • Industrial Internet of Things (IIoT)
  • Smart Cities
  • Cyber-Physical Power Systems
Data analytics for cyber-security
  • Predictive Cyber-Security
  • Event Analysis
  • Event Attribution and Cyber-Forensics
Cyber-security metrics
  • Security and Privacy Metrics and Analysis
  • Metrics of defense effectiveness
  • Quantifying the ‘security/privacy tax’
Human/Societal issues
  • Legal and Policy Topics related to Cyber-Security and Privacy
  • Human Factors in Cyber-Security and Privacy
  • Inter-Organizational Cyber-Threat Information Sharing
Other topics
  • Integration of New Technology into Existing Systems
  • Situational Awareness
  • System Situational Awareness
  • Emerging Threats
  • Event Recovery
  • Security as a Service (SaaS)
  • Private Data as a Service (PDaaS)


Paper Submission: February 27, 2017 (expired)
Authors Notification: March 1, 2017 (expired)
Camera Ready and Registration: March 13, 2017 (expired)


Marina Blanton, Computer Science and Engineering, University at Buffalo, The State University of New York, United States
An Braeken, Vrije Universiteit Brussel, Belgium
Daniel Conte de Leon, Center for Secure and Dependable Systems, University of Idaho, United States
Tiago Cruz, Department of Informatics Engineering, University of Coimbra, Portugal
Ishbel Duncan, Computer Science, University of St. Andrews, United Kingdom
Sunny Fugate, Information Operations,, United States
Kevin Hamlen, Computer Science Department, University of Texas at Dallas, United States
Hongxin Hu, Clemson University, United States
Andreas Jacobsson, Faculty of Technology and Society, Malmö University, Sweden
Jaclyn Kerr, Center for Global Security Research; Center for International Security and Cooperation, Lawrence Livermore National Laboratory; Stanford University, United States
Xenofon Koutsoukos, EECS, Vanderbilt University, United States
Devu MANIKANTAN, United Technologies Research Center, United States
Jason C. Nurse, University of Kent, United Kingdom
Kasper Rasmussen, Independent Researcher, United Kingdom
Mohammad A. Razzaque, Trinity College Dublin, Ireland
Jose Romero-Mariona, SPAWAR Systems Center Pacific, United States
Siamak F. Shahandashti, Newcastle University, United Kingdom
Paulo Simoes, Dep Eng Informática, University of Coimbra, Portugal
Dhananjay Singh, Electronics Engineering , Hankuk Univ. of Foreign Studies, Seoul, Korea, Republic of
Inge Skjelfjord, Harvard University Advanced Leadership Initiative, United States
Jia Song, Computer Science, University of Idaho, United States
Pawel Szalachowski, Singapore University of Technology and Design, Singapore
April Tanner, Computer Science, Jackson State University, United States
Clark Thomborson, University of Auckland, New Zealand


Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Guidelines.
Papers must be submitted electronically via the web-based submission system using the appropriated button on this page.


After thorough reviewing by the special session program committee, all accepted papers will be published in a special section of the conference proceedings book - under an ISBN reference and on digital support - and submitted for indexation by DBLP, Web of Science / Conference Proceedings Citation Index, EI and SCOPUS.
SCITEPRESS is a member of CrossRef ( and every paper is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library


IoTBDS Special Sessions - WICSPIT 2017