Call for Papers: (CFP.txt)

The International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2018), November 28-30, 2018, New York Institute of Technology (NYIT), Vancouver, B.C, Canada

The strong growth in mobile devices, pervasive networked embedded systems, and wireless sensors provide a flexible and cheap infrastructure for collecting and monitoring real-world data nearly everywhere. This is complemented by the rapid increase in information and computing power offered by computing clusters, emerging cloud systems, and information services over stationary and dynamic networks. The integration of network computing and mobile systems presents new challenges with respect to the dependability of integrated applications: accepted measures of availability, costs, and quality of service for high-bandwidth, high-quality stationary systems have to be re-thought facing possibly new dependability paradigms for cheap, resource restricted, unreliable mobile systems with low-bandwidth communication facilities. On the other hand, the proliferation of devices, which are able to directly connect to the Internet has led to a new computing and communication paradigm known as Internet of Things (IoT), where things are expected to autonomously monitor and control several aspects of our daily lives in almost all sectors such as transportation, community, home, environment, education, to name a few.
At the same time, new threat vectors have emerged that leverage and magnify traditional hacking methods, enabling large scale and intelligence-driven attacks against a variety of platforms, including, mobile, cloud, IoT, as well conventional networks.
The consequence of such fast evolving environment is the pressing need for effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems.
This conference solicits papers addressing issues related to the design, analysis, and implementation, of dependable and secure infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems.

Topics include, but are not limited to:
  • Intelligent secure mobile systems
  • Modern and Emerging Authentication Paradigms
  • Biometric Technologies
  • Digital Fraud detection, social engineering and insider threats
  • Cyber threat intelligence
  • Privacy, Security and Trust for Cloud, Mobile, and Internet-of-Things
  • Intrusion and anomaly detection and prevention for mobile, cloud and IOT platforms
  • Digital forensics Cloud, Mobile, and Internet-of-Things ?
  • Emerging Threats, Botnet and Distributed Denial of Service (DDoS) detection and control
  • Dependable Cluster/cloud/ubiquitous computing and grid Computing for mobile applications
  • Dependable Distributed data mining for mobile applications
  • Cryptographic primitives for wireless and mobile security
  • Security and privacy for mobile sensing systems
  • Wireless or mobile security for emerging applications
  • Security protocols for wireless networking
  • Mobile malware and platform security
  • Distributed Systems Security
  • Embedded Systems Security
  • Security architectures for cloud computing
  • Security protocols for cloud computing?
  • Identity management for cloud services
  • Information sharing and data protection in the cloud
  • Trust models for cloud services
  • Hardware security
  • Secure computer architectures
  • Methods for detection of malicious or counterfeit hardware?

Important dates:

Submission of papers:
Acceptance notification:
Camera-ready papers:
Conference date:
July 20, 2018
August 20, 2018
September 15, 2018
nov 28-30, 2018

Paper Preparation and Submission:
Authors should prepare a PDF version of their paper formatting according to the Lecture Notes in Computer Science (LNCS), Springer guidelines at:
Short papers should be 8 pages including references AND regular papers should be up to 20 pages including references.

The submission Web page for ISDDC 2018 through EasyChair system is

In order to submit your paper, you must first create an EasyChair account if you do not have one already, using The EasyChair system will then email you your password, which you can then use.

All accepted papers will be included in conference proceedings of Lecture Notes in Computer Science (LNCS), Springer. Proceedings will be sent by Springer for indexing in EI and SCOPUS. Authors of accepted papers will be given instructions for submission of camera ready and copyright form. Selected papers at ISDDC 2018 will be considered for publication in a Special Issue in a Cybersecurity Journal to be announced.

Note: for any additional query, please email the conference organizers using: