The significant amount of data generated and sent from sensors, individual archives, social networks, IoT networks, and enterprises require utilization of big data analytics in almost all aspects of cybersecurity, forensics and threat intelligence.  As the number of Internet of Things (IoT) devices have been predicted to surpass 50 billion by 2020, attackers’ attention has also shifted towards tools, techniques, and procedures to exploit IoT networks. The number and diversity of nodes exist within IoT networks significantly increase the size of audit and security logs and intrusion data that should be collected and analyzed from the IoT ecosystem. Hence, IoT security and privacy are two urgent big-data challenges. The purpose of this handbook is to explore cybersecurity, forensics, and threat intelligence challenges and solutions relating to big data IoT.

Specifically, this book welcomes two categories of chapters: (1) invited articles from qualified experts; and (2) contributed papers from an open call with a list of addressed topics. Topics of interest include but not limited to:

  • Security technologies for collecting, sharing and analysis of Big Data
  • Intrusion detection and transmission surveillance of IoT and Big Data
  • Storage and system security for Big Data
  • Big Data and IoT forensics
  • Access control of Big Data and IoT
  • Privacy in Big Data and IoT applications and services
  • Secure quantum communications
  • Security model and architecture for Big Data and IoT
  • Cryptography in Big Data and IoT
  • Visualizing large scale security data
  • Threat detection using Big Data analytics
  • Human computer interaction challenges for Big Data and IoT security
  • Scalability and auditing in Big Data and IoT networks
  • Cyber threat intelligence in Big Data and IoT networks
  • Internet of Things (IoT) devices and protocols security
  • Cross-domain trust management in smart communities
  • Cloud computing-based security solutions for IoT data
  • Security challenges and mitigation approaches for smart cities
  • Cyber attacks detection and prevention systems for IoT networks
  • Interoperable security for urban planning and applications
  • Ethics, legal, and social considerations in IoT and Big Data security
  • Secure integration of IoT and Cloud computing
  • Secure integration of IoT, Big Data and social networks
  • Secure and Privacy-Preserving Data Mining and Aggregation in IoT applications
  • Sustainable Intrusion Detection, Prevention, and Analysis for IoT networks
  • IoT malware detection and analysis
  • Big Data malicious programs detection, preservation, and analysis

Important Dates:

  • Submission deadline: 31 March 2018
  • Authors’ notification: 31 Jun 2018 (or 2-month after submission)
  • Revisions due: 31 Jul 2018
  • Camera-ready version due:  31  Aug 2018
  • Tentative publication date: Late 2018

Note: Papers are gradually reviewed and accepted from 1st Sep 2017 until submission deadline or when we reach to the maximum number of pages agreed with Springer. Authors are suggested to submit their chapters as early as possible and consult with one of the editors prior to the paper submission to validate the relevance and suitability of their submissions.


All accepted papers will be published as contributed chapters to a book titled “Handbook of Big Data and IoT Security”. Please carefully format your manuscript in accordance with Springer Book Manuscript Guideline.  To Submit your paper please CLICK HERE..! 


For any enquiries regarding your submission or suitability of your paper, please feel free to contact book editors:

  • Raymond Choo, University of Texas at San Antonio (raymond.choo -at-
  • Ali Dehghantanha, University of Salford, UK (a.dehghantanha – at –