International Conference on 
Intelligent, Secure and Dependable Systems 
      in Distributed and Cloud Environments (ISDDC 2018) 
to be held Nov. 28-30, 2018
New York Institute of Technology (NYIT), 
Vancouver, B.C, Canada

Call for Papers


The strong growth in mobile devices, pervasive networked embedded
systems, and wireless sensors provide a flexible and cheap
infrastructure for collecting and monitoring real-world data nearly
everywhere. This is complemented by the rapid increase in information
and computing power offered by computing clusters, emerging cloud
systems, and information services over stationary and dynamic
networks. The integration of network computing and mobile systems
presents new challenges with respect to the dependability of
integrated applications: accepted measures of availability, costs, and
quality of service for high-bandwidth, high-quality stationary systems
have to be re-thought facing possibly new dependability paradigms for
cheap, resource restricted, unreliable mobile systems with
low-bandwidth communication facilities. On the other hand, the
proliferation of devices, which are able to directly connect to the
Internet has led to a new computing and communication paradigm known
as Internet of Things (IoT), where things are expected to autonomously
monitor and control several aspects of our daily lives in almost all
sectors such as transportation, community, home, environment,
education, to name a few.

At the same time, new threat vectors have emerged that leverage and
magnify traditional hacking methods, enabling large scale and
intelligence-driven attacks against a variety of platforms, including,
mobile, cloud, IoT, as well conventional networks.

The consequence of such fast evolving environment is the pressing need
for effective and efficient paradigms, approaches, and tools for
building, maintaining, and managing secure and dependable systems.

This conference solicits papers addressing issues related to the
design, analysis, and implementation, of dependable and secure
infrastructures, systems, architectures, algorithms, and protocols
that deal with network computing, mobile/ubiquitous systems, cloud
systems, and IoT systems.

Topics include, but are not limited to:

    Intelligent secure mobile systems
    Modern and Emerging Authentication Paradigms
    Biometric Technologies
    Digital Fraud detection, social engineering and insider threats
    Cyber threat intelligence
    Privacy, Security and Trust for Cloud, Mobile, and Internet-of-Things
    Intrusion and anomaly detection and prevention for mobile, cloud
      and IOT platforms
    Digital forensics Cloud, Mobile, and Internet-of-Things ?
    Emerging Threats, Botnet and Distributed Denial of Service (DDoS)
      detection and control
    Dependable Cluster/cloud/ubiquitous computing and grid Computing
      for mobile applications
    Dependable Distributed data mining for mobile applications
    Cryptographic primitives for wireless and mobile security
    Security and privacy for mobile sensing systems
    Wireless or mobile security for emerging applications
    Security protocols for wireless networking
    Mobile malware and platform security
    Distributed Systems Security
    Embedded Systems Security
    Security architectures for cloud computing
    Security protocols for cloud computing?
    Identity management for cloud services
    Information sharing and data protection in the cloud
    Trust models for cloud services
    Hardware security
    Secure computer architectures
    Methods for detection of malicious or counterfeit hardware? 

Important dates:
Submission of papers:  July 20, 2018
Acceptance notification:  August 20, 2018
Camera-ready papers: September 15, 2018
Conference date: Nov 28-30, 2018

Paper Preparation and Submission:

Authors should prepare a PDF version of their paper formatting
according to the Lecture Notes in Computer Science (LNCS), Springer
guidelines at: Short
papers should be 8 pages including references AND regular papers
should be up to 20 pages including references.

The submission Web page for ISDDC 2018 through EasyChair system is

In order to submit your paper, you must first create an EasyChair
account if you do not have one already, using The EasyChair system will
then email you your password, which you can then use.

All accepted papers will be included in conference proceedings of
Lecture Notes in Computer Science (LNCS), Springer. Proceedings will
be sent by Springer for indexing in EI and SCOPUS. Authors of accepted
papers will be given instructions for submission of camera ready and
copyright form. Selected papers at ISDDC 2018 will be considered for
publication in a Special Issue in a Cybersecurity Journal to be

Note: for any additional query, please email the conference organizers