|
| |||||||||||||||
DCS-CI 2026 : 2026 International Conference on Design of Cyber-Secure Critical Infrastructure | |||||||||||||||
| Link: https://dcs-ci.github.io/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
|
The Design of Cyber-Secure Critical Infrastructure (DCS-CI) 26 conference invites researchers, practitioners, and thought leaders to submit original work that advances our collective understanding of how to design, deploy, and maintain secure critical infrastructure systems.
We welcome submissions from diverse disciplinary perspectives, including computer science, control systems engineering, security studies, public policy, and operations management. Interdisciplinary contributions that bridge theoretical innovation with practical application are particularly encouraged. The conference seeks work that is rigorous, relevant, and actionable—research that not only advances academic knowledge but also informs the practices of infrastructure operators, system integrators, and regulatory bodies. DCS-CI 26 welcomes original, high-quality contributions across a broad range of topics related to the design and assurance of cyber-secure critical infrastructure, including, but not limited to: (1) Secure-by-Design and Secure-by-Default Architectures Principles, patterns, and architectural approaches for embedding cyber security into complex cyber-physical systems, including legacy and brownfield environments. (2) Cyber-Physical Risk, Safety, and Resilience Interdependencies between cyber threats, physical processes, safety outcomes, and societal or environmental impacts. (3) Operational Technology (OT) and Automation Security Protection, monitoring, and resilience strategies for industrial control and automation systems across varied operational contexts. (4) System Lifecycle and Engineering Perspectives Cyber security considerations across design, integration, commissioning, operation, maintenance, and decommissioning. (5) Digitalisation and Emerging Technologies Security implications of digital twins, remote operations, autonomous or semi-autonomous systems, and data-driven optimisation. (6) Testing, Validation, and Assurance Use of testbeds, simulations, cyber ranges, and digital environments to validate designs, assess risks, and support training. (7) AI for Cyber-Physical System Security Innovative use of AI for novel and effective of attack and defence. (8) Digital Twins and Cyber Twins * Virtual replicas and simulation environments for security analysis, testing, and operational resilience in critical infrastructure. (Cyber Twins is defined as "purpose-built digital twins for cyber use cases".) There will also be a Best Paper Award to recognize outstanding research contributions. Should you have any inquiry, please don't hesitate to contact us at itrust@sutd.edu.sg. |
|