Very nice idea
On 6 Apr 2015 06:32, <dbpedia-discussion-requ...@lists.sourceforge.net>
wrote:

> Send Dbpedia-discussion mailing list submissions to
>         dbpedia-discussion@lists.sourceforge.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://lists.sourceforge.net/lists/listinfo/dbpedia-discussion
> or, via email, send a message with subject or body 'help' to
>         dbpedia-discussion-requ...@lists.sourceforge.net
>
> You can reach the person managing the list at
>         dbpedia-discussion-ow...@lists.sourceforge.net
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Dbpedia-discussion digest..."
>
>
> Today's Topics:
>
>    1. Fwd: *Call for Chapter Proposals* - Instituting
>       Cyber-Assurance: Information Assurance for the Internet of Things
>       (Tyson Brooks)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Sun, 5 Apr 2015 20:31:17 -1000
> From: Tyson Brooks <dr.tyson.bro...@ieee.org>
> Subject: [Dbpedia-discussion] Fwd: *Call for Chapter Proposals* -
>         Instituting Cyber-Assurance: Information Assurance for the
> Internet of
>         Things
> To: aiswo...@lists.aisnet.org,
>         dbpedia-discussion@lists.sourceforge.net
> Message-ID:
>         <
> cagcdfro6rmx22crb_up1ds86takbvbeohiaefg6soypccbv...@mail.gmail.com>
> Content-Type: text/plain; charset="utf-8"
>
> ****FINAL CALL FOR CHAPTER PROPOSALS***  *
>
> *Instituting Cyber-Assurance: Information Assurance for the Internet of
> Things*
>
>
>
> May 1, 2015: Chapter Proposal Submission
>
> May 15, 2015: Chapter Acceptance Confirmation
>
> September 1, 2015: Final Chapter Submission
>
> January 15, 2016: Publication
>
>
>
> *Introduction*
>
> The goal of this book is to present an information assurance (IA) approach
> to the Internet of Things (IoT). From an information security/IA
> perspective, the IoT must address the delivery of authentic, accurate,
> secure, reliable, timely information, regardless of threat conditions, over
> the distributed and heterogeneous computing and communication systems.  The
> IoT system may range from a hand-held mobile unit to a centralized high
> performance information processing system consisting of heterogeneous
> communication systems of both tactical (mobile, wireless) and fixed (wired)
> communications infrastructures.
>
>
>
> This book provides a first in understanding how IA must integrate with IoT
> to determine whether individual IoT computer/software components as well as
> whole IoT information systems behave and interact only in ways that enable
> them to resist or avoid intentional attempts to compromise their correct
> operations. In order to make this determination, this book is needed to
> understand the variety of IA techniques and technologies to the task of
> seeking out defects that have the potential to be successfully targeted as
> exploitable vulnerabilities by an attacker (i.e. hacker). Furthermore, this
> book will support IA and IoT industry practitioners understanding of how to
> design and build IA into the IoT appropriately given certain assumptions
> (e.g. wireless networks, use of smart devices, etc.), even when such
> assumptions are included in the requirements.
>
>
>
> *Objective of the Book*
>
> The objective of the book is to increase the visibility of current research
> and emergent trends in IA theory, application, architecture and information
> security in the IoT based on theoretical aspects and studies of practical
> applications. The book will cover fundamental to advanced concepts
> necessary to grasp IoT current IA issues, challenges and solutions as well
> as future trends in IoT infrastructures, architectures and applications.
> The topics of the book will include the IA protection of IoT systems and
> information in storage, processing, or transit from unauthorized access or
> modification for M2M devices, radio-frequency identification (RFID),
> wireless sensor networks, Smart Grids and supervisory control and data
> acquisition (SCADA) systems and IA measures necessary to detect, protect
> and defend IoT information and networks/systems to ensure their
> availability, integrity, authentication, confidentiality, and
> non-repudiation; including providing for restoration of IoT
> networks/systems by incorporating protection, detection, and reaction
> capabilities. The focus areas include IoT computational and information
> sciences, information processing, fusion and circuits, information
> protection for IoT networks, IoT sensors and IoT mathematical sciences.
>
>
>
> In addition, the educational value of this book is to serve as an effective
> bridge between academic research on theory, and science-practitioners work
> with IoT technology. It is anticipated that this work will be a primary
> source of reading for students wishing to become involved in IA for IoT
> research. Additionally, the book is to gather the knowledge and experience
> of expert IA and IoT researchers who work in the area of wireless networks,
> clouds, information security architecture and IoT and elicit their
> knowledge in a collaborative effort that leads to an edited book which will
> be one of the first of its kind. The consecutive chapters of this book will
> present topics related to the actual IA IoT research that work together to
> carry out coordinated functions. The chapters will also present new
> information security theory and applications devoted to the improvement and
> development of IoT networks.
>
>
>
> *Target Audience*
>
> The target audience of this book will be composed of researchers,
> professionals and students working in the field of wireless technologies,
> information system theory, systems engineering, information security
> architecture and security system design along with university professors
> and researchers involved in IA and IoT related networking. Through a
> collection of edited essays from IA and IoT industry practitioners and
> experts, the book will be written for graduate students, researchers and
> academics who want to improve their understanding of the latest
> developments of IA for the IoT. IA capabilities protect and defend network
> availability, protect data integrity, and provide the ability to implement
> effective computer network defense (CND) for the IoT. IA is imperative so
> that its confidentiality, integrity, availability, and non-repudiation can
> be ensured, and that users of that IoT data can be properly identified and
> authenticated. Since these IoT networks presents unique IA challenges,
> there will be a heavy reliance on the secure communication of urgent and
> time-sensitive information over these IoT networks. This book will discuss
> the IA needs of the IoT environment, highlighting key IA IoT issues and
> identifying the associated security implications so that the general
> readers can readily grasp the core ideas in this area of research.
>
>
>
> Recommended topics include, but are not limited to, the following:
>
>
>
> *Cyber-Hacking and the IoT: *
>
> ?         Cyber-threats towards the IoT,
>
> ?         Automated IoT vulnerability identification,
>
> ?         IoT penetration testing,
>
> ?         IoT detection and identification monitors,
>
> ?         IoT incident handling/incident response methodologies,
>
> ?         IoT digital forensics techniques,
>
> ?         IoT secure-by-design systems and,
>
> ?         IoT attack strategies
>
>
>  *IoT Wireless Information Assurance and Communications:  *
>
> ?         Research on automated IoT vulnerability assessment and intrusion
> detection tools and techniques,
>
> ?         Genetic algorithms used to spawn and control intelligent agents
> for information assurance for IoT devices,
>
> ?         Information hiding in IoT images and text (steganography and
> watermarking),
>
> ?         Key distribution and security in an IoT network,
>
> ?         Tools and techniques for automating the creation and distribution
> of interoperable vulnerability IoT knowledge bases,
>
> ?         Tools and techniques for automated and analysis and correlation
> of anomalies, probes, and detections from multiple sites and to support
> post-incident forensic analysis and,
>
> ?         Network management and visualization tools that support real time
> planning and control of tactical nets as well as tools for intrusion
> detection and forensic analysis in hybrid IoT networks
>
>
> *Cyber-Physical Systems for the IoT:*
>
> ?         Synchronized cyber-attacks against the Smart Grid and/or SCADA
> systems,
>
> ?         Modeling framework for CPS under cyber-attacks,
>
> ?         Optimal network clustering for distributed procedures in CPS,
>
> ?         SCADA testbeds for CPS and,
>
> ?         Secure CPS IA designs
>
>
>
> *IoT Information and Data Fusion: *
>
> ?         IoT data representation,
>
> ?         IoT data encoding and transmission,
>
> ?         IoT measurement of the informativeness of both data and the
> fusion system and,
>
> ?         IoT frameworks which allow diverse input data streams to be
> transformed into a unified information fusion space for processing using
> more unified and tractable procedures
>
>
>  *IoT Information and Signal Processing: *
>
> ?         IoT signal processing environment,
>
> ?         Fuzzy and neural IoT networks,
>
> ?         IoT discrete event dynamical systems,
>
> ?         Non-linear IoT systems using electronic, biological, optical,
> acoustical or electro-optical techniques and,
>
> ?         Development of design methods, architectures, and implementations
> to minimize IoT power dissipation
>
>
>  *IoT Radio Frequency (RF) Signal Processing:  *
>
> ?         IoT radar component technology, including wide-bandwidth/
> low-frequency antennas, high-power transmitters, high-speed signal
> processors, and analog-to-digital converters,
>
> ?         RFI extraction/avoidance techniques,
>
> ?         Optimization of IoT algorithm code,
>
> ?         High-precision position IoT GPS/location systems,
>
> ?         Self-aligning and calibrating arrays for the IoT and,
>
> ?         IoT detection, tracking and classification algorithms
>
>
>  *IoT Circuits:  *
>
> ?         Design tools for integrating RF devices and components, such as
> inductors and optics, on IoT processing chips,
>
> ?         Circuits, such as mixers, oscillators, amplifiers, phase-locked
> loops, voltage-controlled oscillators, digital-to-analog and analog-
> to-digital converters and correlators,
>
> ?         IoT technology for implementing monolithic transceivers on single
> integrated circuits and,
>
> ?         IoT processors capable of multiple gigahertz operation
>
>
>
> *IoT IA Evaluation Metrics and Risk Mitigation Methods: *
>
> ?         Measures and metrics associated with assurance determination of
> existing IoT systems (particularly when the existing security perimeter has
> been modified operationally) and for the security engineering process
> associated with new development (which includes new code and COTS
> composition),
>
> ?         Means of matching the IA security protection mechanisms to the
> existing IoT threat and modifying this set of factors as the threat changes
> are sought and,
>
> ?         Research into processes and procedures that minimize human error
> and vulnerability introduction
>
>
> *Testing, Assessing, and Mitigating IoT System Vulnerabilities: *
>
> ?         IoT system security and vulnerability assessment framework and
> methodology,
>
> ?         Novel security and vulnerability IoT assessment methods,
>
> ?         Adaptive countermeasures to attacks and to IoT system
> vulnerability exploitation and,
>
> ?         Framework and methodology for building secure, intrusion immune
> host and IoT network systems
>
>
> *Correlation, Fusion, Analysis, and Visualization of Systems Security
> Information: *
>
> ?         Multi-sensor, multi-site event correlation, analysis, and fusion
> for the IoT,
>
> ?         Methodology and techniques to improve the quality of attack
> indications or warnings for IoT systems and,
>
> ?         IoT visualization and presentation
>
>
> *IoT Sensor Network Communications:  *
>
> ?         IoT sensor networking systems, including signal processing and
> communications interactions, distributed detection and estimation, and
> networking protocols,
>
> ?         Ad-hoc IoT sensor network protocols,
>
> ?         Energy efficient IoT modems,
>
> ?         Secure 6LoWPAN signal processing,
>
> ?         Small broadband antenna for the IoT,
>
> ?         Forward-error-correction for the IoT and,
>
> ?         Ultra wideband systems, including coexistence issues and IoT
> system overlays
>
>
>  *IoT RF Electronics:  *
>
> ?         High frequency IoT devices and modules to enhance situational
> analysis and increase the communication functionality,
>
> ?         Low power, high accuracy IoT frequency control devices for
> navigation and communication systems and,
>
> ?         Novel IoT RF acoustics and microwave/millimeter wave electron
> beam devices
>
>
>
> *Modeling of Complex IoT Systems:  *
>
> ?         Modeling of multiscale IoT objects and functions,
>
> ?         Nonlinear dynamics for IoT communication,
>
> ?         Data fusion in complex IoT networks,
>
> ?         Dynamics of distributed networks of embedded sensors and
> actuators and,
>
> ?         Behavioral modeling for IoT hacking behaviors
>
>
>  *Computational Mathematics for IoT IA:  *
>
> ?         Numerical methods on finding solutions to IoT algorithmic
> problems associated with currently intractable computational problems and
> new applications,
>
> ?         Stochastic analysis and applied probability for IoT
> networks/systems,
>
> ?         IoT statistical methods,
>
> ?         Discrete mathematics for IoT networks and,
>
> ?         Fundamental issues in IoT parallel computing such as advanced
> data structures for parallel architectures, parallel algorithms, graph
> theoretic methods applied to a parallel and distributed computation and
> models and algorithms for the control of heterogeneous concurrent IoT
> computing
>
>
>
> *Submissions*
>
> Inquiries and submissions may be forwarded (Word document) to: Dr. Tyson T.
> Brooks* IEEE Senior Member @ dr.tyson.bro...@ieee.org
>
>
>
> *Submission Procedure*
>
> Submitted papers must be in English and should not have been published
> elsewhere or being currently under consideration by any other journal.
> Researchers and practitioners are invited to contact the editor and submit
> as soon as possible a 2-3 page chapter proposal clearly explaining the
> topic of his or her proposed chapter. Authors of accepted submissions will
> be informed by the editor of acceptance as soon as possible.
>
>
>
> *Important Dates*
>
> May 1, 2015: Chapter Proposal Submission
>
> May 15, 2015: Chapter Acceptance Confirmation
>
> September 1, 2015: Final Chapter Submission
>
> January 15, 2016:  Publication
>
>
>
> *Copyright Forms*
>
> Each manuscript must be accompanied by a statement that it has been neither
> published nor submitted for publication, in whole or in part, either in a
> serial, professional journal or as a part in a book which is formally
> published and made available to the public. For the mutual benefit and
> protection of authors and publishers it is necessary that authors provide
> formal written consent to publish and transfer of copyright before the
> publication of the article.
>
>
>
> *Publisher*
>
> Wiley-IEEE Press in under consideration for publishing services. For
> additional information regarding the publisher, please visit
> http://www.wiley.com/WileyCDA/Section/id-301678.html.
>
>
>
> *The views expressed by the editor are not necessarily shared by any
> institution or organization with which the author may be affiliated.
>
>
> Dr. Tyson T. Brooks, CEA, PMP
> IEEE Senior Member
> -------------- next part --------------
> An HTML attachment was scrubbed...
>
> ------------------------------
>
>
> ------------------------------------------------------------------------------
> BPM Camp - Free Virtual Workshop May 6th at 10am PDT/1PM EDT
> Develop your own process in accordance with the BPMN 2 standard
> Learn Process modeling best practices with Bonita BPM through live
> exercises
> http://www.bonitasoft.com/be-part-of-it/events/bpm-camp-virtual-
> event?utm_
> source=Sourceforge_BPM_Camp_5_6_15&utm_medium=email&utm_campaign=VA_SF
>
> ------------------------------
>
> _______________________________________________
> Dbpedia-discussion mailing list
> Dbpedia-discussion@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/dbpedia-discussion
>
>
> End of Dbpedia-discussion Digest, Vol 98, Issue 2
> *************************************************
>
------------------------------------------------------------------------------
BPM Camp - Free Virtual Workshop May 6th at 10am PDT/1PM EDT
Develop your own process in accordance with the BPMN 2 standard
Learn Process modeling best practices with Bonita BPM through live exercises
http://www.bonitasoft.com/be-part-of-it/events/bpm-camp-virtual- event?utm_
source=Sourceforge_BPM_Camp_5_6_15&utm_medium=email&utm_campaign=VA_SF
_______________________________________________
Dbpedia-discussion mailing list
Dbpedia-discussion@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dbpedia-discussion

Reply via email to