About the Journal
The Journal of Pervasive Technology publishes high-quality, peer-reviewed articles on low power technique, network security, smart grid research, multimedia codec design and developing, and not limited but, including:
• Multimedia Processing and Communication
• Low Power and High Performance Software and Hardware Design
• Smart Grid and Its Applications
• Advanced Security Technologies and Applications
• New, future, enhanced Technologies
The journal articles:
• Original Research Papers
• Technical Evaluations
• Case Reports on Echocardiograms
• Reviews
• Guest Editorials
Current CFP and interested areas
Section #1: Multimedia Processing and Communication
-Multimedia compression
-Multimedia communications and networking
-Interactive 3-D media and immersive environments
-Multimedia content analysis and search
-Multimedia quality assessment
-Multimedia applications and services
-Multimedia security and privacy
-Multimedia databases and digital libraries
Section #2: Low Power and High-Performance Software and Hardware Design
-Low power and high-performance system-on-chip design
-Low power and high performance embedded systems software
-Low power and high performance embedded systems hardware
-Low power and high performance real-time and cyber-physical systems
-Low power and high-performance pervasive computing technologies
-Low power and high performance emerging technologies, systems, and applications
Section #3: Advanced technology for Industrial Control System and Internet of Things
-System on Chip for ICS/IoTs
-ICS/IoT secure communications
-Protection of ICS, SCADA, DCS, RTU, PLC
-Fault-tolerant control for ICS/IoT
-Security and advanced technology for Industrial intelligence sharing platform
-Operational technology
Section #4: Advanced Security Technologies and Applications
-Key management in wireless/mobile environments
-Trust establishment
-Intrusion, attack, and malicious behavior detection
-User and location privacy
-Anonymity, prevention of traffic analysis
-Vulnerability and attack modeling
-Cross-layer design for security
-Monitoring and surveillance
-Cryptographic primitives for wireless communication
-Theoretical foundations and formal methods for wireless security and privacy
-Security/privacy in mobile/wireless cloud services
Current Issue
As the renewal special volume, this publication is to discuss advanced low-power hardware technology and leading-edge technologies in all areas of microprocessors, multimedia, smart grid, IoT/ICS, and their application and security. The special volume calls paper submissions from anyone in this field.