Skip to main content

Special issue

ARES 2015 / Cyber-Physical Systems

EURASIP Journal on Information Security welcomes submissions to the new special issue on ARES 2015 / Cyber-Physical Systems.

In this special issue we would like to explore security aspects of cyberphysical systems (CPS). CPS can be seen as a "network of networked devices", encompassing embedded devices, PCs and servers, and mobile devices. To secure such systems, many sub-specializations of information security are necessary, among them network security, embedded software security, and hardware security. Attacks such as malware spreading through USB sticks to industrial control systems highlight that humans are (still) in the loop of such interconnected systems and thus need to be considered when designing, implementing, testing, deploying, and maintaining such systems.

This special series originates from the 10th International Conference on Availability, Reliability and Security which was held in August 2015 at the Université Paul Sabatier in Toulouse, France. Initially, it publishes some key contributions presented at the conference describing different aspects of availability, reliability and security with a focus on cyber-physical systems.

For this special issue we invite submission that address security issues of CPS and look at some specific topics related to CPS. Extended conference submissions are permissible if (i) the original paper is clearly and explicitly referenced in the introduction and (ii) the new content is at least 40%.

The Special Issue will emphasize the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. The ARES Conference is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map. The papers included in the Special Issue will highlight the various aspects of cyber-physical systems. The Special Issue is open for all submissions and not restricted to ARES conference papers.

Topics include, but are not limited to the following: 

  • Iaas Cloud Computing
  • Cryptography
  • Survivability of Computing Systems
  • Digital Forensics
  • Mobile Security

Submission instructions:

Before submitting your manuscript, please ensure you have carefully read the Instructions for Authors for EURASIP Journal on Information Security. The complete manuscript should be submitted through the EURASIP Journal on Information Security submission system. To ensure that you submit to the correct special issue please select the appropriate section in the drop-down menu upon submission. In addition, indicate within your cover letter that you wish your manuscript to be considered as part of the special issue on ARES 2015 / Cyber-Physical Systems. All submissions will undergo rigorous peer review and accepted articles will be published within the journal as a collection.

Deadline for submissions: 

February 28th, 2016

 

Lead guest editor:

Edgar Weippl, SBA Research - Vienna University of Technology, Austria

 

Submissions will also benefit from the usual benefits of open access publication:

  • Rapid publication: Online submission, electronic peer review and production make the process of publishing your article simple and efficient
  • High visibility and international readership in your field: Open access publication ensures high visibility and maximum exposure for your work - anyone with online access can read your article
  • No space constraints: Publishing online means unlimited space for figures, extensive data and video footage
  • Authors retain copyright, licensing the article under a Creative Commons license: articles can be freely redistributed and reused as long as the article is correctly attributed

 

For editorial enquiries please contact editorial@jis.eurasipjournals.com

Sign up for article alerts to keep updated on articles published in EURASIP Journal on Information Security including articles published in this special issue!