<div dir="ltr"><div style="font-family:arial,sans-serif;font-size:13px"><i><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif">Apologies for receiving multiple copies -Please circulate this CFP among your colleagues and students</span></i><br></div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">Call for Papers</div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">********************************************************************************************</div><div style="font-family:arial,sans-serif;font-size:13px"><h2 style="text-align:left;margin:0px;padding:0px;border:0px;font-family:&#39;Open Sans&#39;,sans-serif;font-stretch:inherit;line-height:26.3999996185303px;vertical-align:baseline;color:rgb(0,0,0)"><span style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline;color:rgb(98,138,138)">IoT/CPS-Security 2015</span></h2></div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">The First IEEE International Workshop on</div><h3 style="font-family:arial,sans-serif;margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:12pt;font-family:Calibri,sans-serif;color:black">Security and Privacy for Internet of Things and Cyber-Physical Systems </span></h3><h3 style="font-family:arial,sans-serif;margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><a href="http://conta.uom.gr/SPIC2015/cfp.html" target="_blank" style="font-family:Calibri,sans-serif;font-size:11pt;font-weight:normal;line-height:21.6pt">http://conta.uom.gr/IoTCPSsecurity2015/cfp.html</a></h3><div style="font-family:arial,sans-serif;font-size:13px">Organized in conjunction with</div><h3 style="font-family:arial,sans-serif;margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:12pt;font-family:Calibri,sans-serif;color:black"><a href="http://icc2015.ieee-icc.org/" target="_blank">IEEE International Conference on Communications (ICC 2015)</a></span></h3><div style="font-family:arial,sans-serif;font-size:13px"><span lang="EN-US" style="font-size:12pt;font-family:Calibri,sans-serif;color:black"><h3 style="color:rgb(34,34,34);font-family:arial,sans-serif;margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black;font-weight:normal"><a href="http://icc2015.ieee-icc.org/" target="_blank">http://icc2015.ieee-icc.org/</a></span></h3></span></div><div style="font-family:arial,sans-serif;font-size:13px">8-12 June 2015, London, UK</div><div style="font-family:arial,sans-serif;font-size:13px">********************************************************************************************<br></div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">Sponsored by IEEE Communications Society</div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------<br></div><div style="font-family:arial,sans-serif;font-size:13px"><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black">NEW DATES<u></u><u></u></span></h3><div><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px">------------------------------</span><span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px">-----------------</span><br></span></div><p class="MsoNormal"><span lang="EN-US" style="color:black;background-image:initial;background-repeat:initial">Paper Submission Deadline: <b><span style="border:1pt none windowtext;padding:0cm">10 January, 2015</span></b></span><span lang="EN-US" style="color:black"><br><span style="background-image:initial;background-repeat:initial">Author Notification: <b>14 February<span style="border:1pt none windowtext;padding:0cm">, 2015</span></b></span><br><span style="background-image:initial;background-repeat:initial">Camera Ready Manuscript: <b><span style="border:1pt none windowtext;padding:0cm">28 February, 2015</span></b></span><br><span style="background-image:initial;background-repeat:initial">Workshop Date: <b><span style="border:1pt none windowtext;padding:0cm">8 June, 2015</span></b></span></span></p><p class="MsoNormal"><span lang="EN-US" style="color:black"><span style="background-image:initial;background-repeat:initial"><b><br></b></span></span></p><div>-----------------------------------------------<br></div><p class="MsoNormal"><span lang="EN-US" style="color:black"><span style="background-image:initial;background-repeat:initial"></span></span></p><div><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black">More Information<u></u><u></u></span></h3><div><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black"><span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px">------------------------------</span><span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px">-----------------</span></span></div></div><p class="MsoNormal"><span lang="EN-US" style="color:black"><span style="background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif"><a href="http://conta.uom.gr/SPIC2015/" target="_blank">http://conta.uom.gr/</a></span></span></span><a href="http://conta.uom.gr/SPIC2015/cfp.html" target="_blank" style="line-height:21.6pt;font-size:11pt;font-family:Calibri,sans-serif">IoTCPSsecurity2015</a><a href="http://conta.uom.gr/SPIC2015/" target="_blank" style="font-family:Calibri,sans-serif;font-size:11pt">/</a></p><p class="MsoNormal"><span lang="EN-US" style="color:black"><br></span></p></div><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div><div style="font-family:arial,sans-serif;font-size:13px"><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><font color="#000000" face="Calibri, sans-serif">Scope</font></h3></div><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div><div style="font-family:arial,sans-serif;font-size:13px">Recent advances in networking, communications, computation, software, and hardware technologies have revolutionized the way humans, smart things, and engineered systems interact and exchange information.  The Internet of Things (IoT) and Cyber-Physical Systems (CPS), which are the major contributors in this area, will fuel the realization of this new, globally interconnected cyber-world.  Yet, the success, prosperity, and advancement of IoT and CPS strongly depend on the security, privacy, and trust of the IoT and cyber-physical devices as well as the sensitive data being exchanged.  While these technologies offer a lot of new possibilities, the increasing complexity of hardware and software as well as the worldwide access increase the vulnerability to security attacks  Successful attacks targeted to IoT devices and CPS have in common that not only a single computer is affected, but also interconnected technical systems allowing interaction with the physical world are influenced, leading to malfunction of devices and control systems with severe financial, environmental, and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT &amp; CPS. The goal of this workshop is to bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT and CPS.<br></div><div style="font-family:arial,sans-serif;font-size:13px"><div><br></div></div><div style="font-family:arial,sans-serif;font-size:13px"><div>-----------------------------------------------</div><div><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Topics of Interest</span></h3></div><div>-----------------------------------------------</div></div><div style="font-family:arial,sans-serif;font-size:13px">To ensure complete coverage of the advances in this field, the 2015 IoT/CPS-Security Workshop solicits original contributions in, but not limited to, the following topical areas:</div><div style><ul style><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Security, Privacy, and Trust for IoT and CPS</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Secure IoT and CPS architectures</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Detecting and preventing attacks in IoT devices and CPS</li><li style="margin-left:15px"><font face="arial, sans-serif">Security in Machine-to-Machine (M2M) systems</font><br></li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Evaluation of Threats, Attacks, and Risks in IoT and cyber-physical devices</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Data Security and Privacy in the IoT</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Game Theory for IoT and CPS Security</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Security and Privacy in IoT RFID, sensors, actuator technologies, applications and services</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Security in Smart Grids and Smart Spaces</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Network-distributed sensor processing for security solutions in CPS</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Test-bed and performance metrics of security solutions in CPS</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Deployment and performance studies of secure CPS</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Secure Network Control Systems for CPS applications</li><li style="font-family:arial,sans-serif;font-size:13px;margin-left:15px">Architectures for secure hardware/software CPS</li></ul><div style><div style><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div><div style="font-family:arial,sans-serif;font-size:13px"><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Submission Procedure</span></h3></div><div style><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div><div style><font face="arial, sans-serif">The workshop accepts only novel, previously unpublished papers. All submissions should be written in English with a maximum paper length of six (6) printed pages (10-point font) including figures without incurring additional charges, and must be formatted in strict accordance with the IEEE Communication Society author guidelines. For more information please visit the following URL: </font></div><div style><span style="margin:0px;padding:0px;border:0px;font-family:&#39;Open Sans&#39;,sans-serif;font-size:16px;font-weight:700;font-stretch:inherit;line-height:28.7999992370605px;vertical-align:baseline;color:rgb(0,0,0);text-align:justify"><a href="http://icc2015.ieee-icc.org/content/authors-guidelines" target="_blank" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline;color:rgb(98,138,138);outline:none;text-decoration:none">http://icc2015.ieee-icc.org/content/authors-guidelines</a></span><font face="arial, sans-serif">.</font></div><div style><font face="arial, sans-serif"><br></font></div><div style><font face="arial, sans-serif">The EDAS link for submission is:</font></div><div style><span style="margin:0px;padding:0px;border:0px;font-family:&#39;Open Sans&#39;,sans-serif;font-size:16px;font-weight:700;font-stretch:inherit;line-height:28.7999992370605px;vertical-align:baseline;color:rgb(0,0,0);text-align:justify"><a href="https://edas.info/newPaper.php?c=18701&amp;track=66317" target="_blank" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-weight:inherit;font-stretch:inherit;line-height:inherit;vertical-align:baseline;color:rgb(98,138,138);outline:none;text-decoration:none">https://edas.info/newPaper.php?c=18701&amp;track=66317</a></span><br></div><div style="font-family:arial,sans-serif;font-size:13px"><br></div><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div></div><div style="font-family:arial,sans-serif;font-size:13px"><h3 style="margin:0cm 0cm 0.0001pt;line-height:21.6pt;vertical-align:baseline;background-image:initial;background-repeat:initial"><span lang="EN-US" style="font-size:11pt;font-family:Calibri,sans-serif;color:black">Organizing Committee</span></h3></div><div style="font-family:arial,sans-serif;font-size:13px">-----------------------------------------------</div></div><div style="font-family:arial,sans-serif;font-size:13px"><br></div></div></div><div><div><b>General Co-Chairs:</b></div><div>Anastasios A. Economides (Univ. of Macedonia, Greece)</div><div>Minho Jo (Korea University, South Korea)</div><div>Houbing Song (West Virginia University, USA)</div><div>Daqiang Zhang (Tongji University, China)</div><div><br></div><div><b>Technical Program Co-Chairs:</b></div><div>Eirini Karapistoli (Univ. of Western Macedonia, Greece)</div><div>Vasilis Friderikos (King&#39;s College London, UK)</div><div>Joao Paulo Miranda (CPqD, Brazil)</div><div>Dev Audsin (Orange, UK)</div><div>Krishna Kumar Venkatasubramanian (Worcester Polytechnic Institute, USA)</div><div>Jianguo Ding (University of Skovde, Sweden)</div><div><br></div><div><b>Publicity Co-Chairs:</b></div><div>Qinghe Du (Xi&#39;an Jiaotong Univ., China)</div><div>Heath LeBlanc (Ohio Northern University, USA)</div><div>Eirini Karapistoli (Univ. of Western Macedonia, Greece)</div></div><div><br></div><div><br></div>-- <br><div dir="ltr"><div style="font-family:arial;font-size:small"><br></div><div style="font-family:arial;font-size:small">--------------------------------------------------</div><div style="font-family:arial;font-size:small">Heath LeBlanc, Ph.D.</div><div style="font-family:arial;font-size:small">Assistant Professor</div><div style="font-family:arial;font-size:small">Electrical &amp; Computer Engineering and </div><div style="font-family:arial;font-size:small">Computer Science Department</div><div style="font-family:arial;font-size:small">Ohio Northern University</div></div>
</div>