Call for papers
COMPUTING
- Pervasive/Ubiquitous Computing
- Smart Networking Models
- Cyber-physical Systems
- Cognitive and Grid Computing
- Block Chain/Digital Currency
- Cloud, Fog Computing & Virtualization
- Mobile Computing & Ad Hoc Networks
- Autonomous Agents
- Robust Control Agents
- Big Data Tools & Technologies
- Security, Privacy and Economics in Smart Environments
- Human-centric and Pervasive Computing
- Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
- Service and Systems Design and QOS Network Security
- Software Protection, Tamper Resistant Software & Prevention of Traffic Analysis
- Software Security, System Security & Web Security
- Trust Establishment, Trust Management, Trust Models and Metrics, Regulation and Trust Mechanisms
- Wired/Wireless Integrated Networks
- Database and System Security
- Virus, Worms, Trojan Protection, E-mail Security, Spam, Phishing and E-mail Fraud
- Anti-Virus and Anti-Hacker Measures
- Steganography
- Multimedia Security
- Human factors in security
COMMUNICATION AND ELECTRONICS
- IoT and Machine Learning
- Mobile Edge Computing
- IoT Security (Authentication, Access Control, Security Models) and Privacy Preservation
- Electronics for the Internet of Things
- Medical and Healthcare Systems via Internet
- Internet of Things Communication Systems and Network Infrastructures
- Cyber Security
- IoT Application Programming Interface (API)
- 5G & 6G Enabling IoT Technology
- Cloud Computing, Fog Computing, and Edge Computing
- IoT Large Scale Pilots and Portability
- IoT Interoperability and Multi-Platform Integration
- IoT Protocols and Standards (IPv6, 6LoWPAN, RPL, 6TiSCH, WoT, oneM2M, etc.)
- Sensors Data Management, IoT Mining and Analytics
- Smart Home and IoT-based Building Automation
- Semantic Technologies, Collective Intelligence
- Cognitive and Reasoning about Things and Smart Objects
- Mobile Cloud Computing (MCC) and IoT
- Horizontal Application Development for IoT
- Green IoT: Sustainable Design and Technologies
- IoT and Blockchain
- Artificial Intelligence Based Security and Data Protection
- Wireless Sensor Network for IoT Security
- Cryptography, Key Management, Authentication and Authorization for IoT
- Physical/MAC/Network Attacks in Internet of Things
- Cross-layer Attacks in IoT
- Big Data and Information Integrity in IoT
- Multi-Objective IoT System Modeling and Analysis-Performance, Energy, Reliability, Robustness
- IoT Deployment on Agriculture, Retails, Smart Cities, etc.
- IoT Interconnections Among ISPs Analysis-QoS, Scalability, Performance, Interference