Introduction 

Due to the increase in smart and intelligent applications size, complexity and the number of components, it is no longer practical to anticipate and secure all possible interactions and data processing in these applications using the traditional information security models. The emerging of new engineering research areas is a clear evidence of the emergence of new demands and requirements of smart Internet of Things (IoT) applications to be more secure. The IoT offers advanced connectivity of devices, systems, and services that go beyond machine-to-machine communications and covers a variety of domains and applications. The interconnection of embedded devices is expected in many fields including Mobility and Intelligent Transport. It is being promoted by the software engineering community to use such systems as the adequate solution to handle the current requirements of complex big data processing problems that demanding distribution, flexibility, and robustness.  However, information security of such systems is still on-the-fly a big challenge.

The main objective of this book is to provide an exhaustive review on the challenges of information security in smart and intelligent applications; especially those are working in big data environments. In addition, it aims to provide a collection of high quality research works that address broad challenges in both theoretical and application aspects of intelligent and smart real life applications. We invite colleagues to contribute original book chapters that will stimulate the continuing effort on the information security solutions of the intelligent systems and their applications that leads to solve the problem of secure big data processing in a smart environment.  We invite all researchers and practitioners who are developing algorithms, systems, and applications, to share their results, ideas, and experiences. Besides the main topic covering all related Secure Applications in Smart City and Big Data Environments.  Topics of interest include, but are not limited to, the following:

  • Security and privacy frameworks for IoT-based smart cities
  • Critical infrastructures resilience and security in smart cities
  • Internet of Things (IoT) devices and protocols security
  • Privacy-preserving big data processing, fusion, mining and analytics
  • Challenges of IoT to Cybersecurity
  • Engineering secure IoT systems
  • Survey on the recent advances and progress in security solutions in Smart and Intelligent Applications.
  • Cyber Security in smart and Intelligent Applications
  • Security solutions for information and social systems
  • Biometric modalities involved in social activities
  • Privacy challenges and mitigation approaches
  • Secure / privacy-preserving big data collection, data sharing, and data integration
  • Secure / privacy-preserving data mining, data science and data analytics
  • Security and privacy concerns of smart healthcare, e-banking, e-government systems.
  • cryptographic technique application

 Chapter Submission

Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, or Word, and according to the Springer's svmlt template that can be downloaded from the (link). Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should submit  their manuscripts electronically through easychair submission system

https://easychair.org/conferences/?conf=ssc2018

in PDF. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published in Studies in CI by Springer WITH h-INDEX=37

Publication Schedule

The tentative schedule of the book publication is as follows:

 Deadline for paper submission: Dec 30, 2017

First round notification : Feb 20, 2018

Camera-ready submission:  May 15, 2018

Volume editors

Aboul Ella Hassanien,

Scientific Research Group in Egypt, Cairo University, Egypt.

aboitcairo@gmail.com

Dr. Mohamed Elhoseny

Scientific Research Group in Egypt, Cairo University, Egypt.

Faculty of Computers and Information Sciences, Mansoura University, Egypt.

Department of Computer Science and Engineering, University of North Texas, USA

Mohamed.Elhoseny@unt.edu

Dr. Syed Hassan Ahmed

Kyungpook National University, 80 Daehak-ru, Bukgu, Daegu, 41566, Republic of Korea

Dr. Amit Kumar Singh

Department of CSE & IT, Jaypee University of Information Technology (JUIT), Waknaghat, Solan, Himachal Pradesh INDIA