posted by organizer: rjrodriguez || 11486 views || tracked by 9 users: [display]

IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructure Protection

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
 
When N/A
Where N/A
Submission Deadline Oct 15, 2016
Notification Due Dec 31, 2016
Final Version Due May 15, 2017
Categories    computer science   security   safety   formal methods
 

Call For Papers

.:[ CALL FOR PAPERS ]:.

Int. J. of Critical Computer-Based Systems. Special Issue on: "Methods and Tools for Assurance of Critical Infrastructure Protection"

URL: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
################

# Guest Editors:
Dr. Stefano Marrone, Second University of Naples, Italy
Dr. Ricardo J. Rodríguez, University of Zaragoza, Spain

Modern society relies on large, heterogeneous, and complex software intensive systems to support all kinds of daily activities. Services such as urban transportation, logistics, healthcare, data communication, railway, aerospace, and power distribution, among others, are becoming heavily dependent on the availability of such infrastructures. Any discontinuity of service may lead to serious problems, from severe financial losses to fatalities or injuries. Discontinuity causes may have different natures, from human error or unexpected acts of nature to intentional attacks like sabotage or terrorism. Safety and security (S&S) assessments in critical infrastructures measure how these disruptions are handled and quantify the impact suffered by the critical infrastructure under abnormal operation. These assessments are normally performed using analytical or simulation based techniques often addressing one single specific aspect at a time rather than studying these infrastructures in a holistic manner.

This special issue aims at bringing together contributions by scientists and practitioners to shed light on the advancements on assurance methods and techniques for critical infrastructure protection. We invite investigators to contribute original research articles as well as review articles that assemble visions, ideas, experiences, and research advancement in this area.

The issue will carry revised and substantially extended versions of selected papers presented at the 1st International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (S4CIP 2016) , but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

# Subject Coverage

Suitable topics include, but are not limited, to the following:

* Methods and methodologies: threat, vulnerability and risk assessment; model based penetration testing; security metrics definition and evaluation; RAMSS analysis; crisis and emergency management; unifying modelling methodologies for cyber and physical security; resilience engineering.
* Modelling: stochastic modelling; formal methods; domain specific languages and model driven engineering; multi level hierarchical modelling; multi paradigm modelling.
* Analysis: quantitative and qualitative evaluation; interconnections among non-functional aspects (e.g. reliability vs. Safety, Security vs. Performance); multi-solution processes; resilience analysis
* Domains: cyber physical systems; critical infrastructure protection; SCADA and control systems security; homeland security; transportation, manufacturing, energy, health and banking applications; computer networks and cloud infrastructures.

# Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a **double blind** process. No author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the Guest Editors if you have any questions. Papers that are not properly anonymized may be rejected without review.

All papers must be submitted online.

# Important Dates

Submission of manuscripts: 15 October, 2016
Notification to authors: 31 December, 2016
Revised paper: 15 March, 2017
Final Decision: 15 April, 2017
Final versions due: 15 May, 2017

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SI: ImmersiveEducation 2025   Computers & Education: X Reality (Elsevier Journal) - Special Issue on Immersive Learning: From Theory to Practice, Building Evidence-Based Frameworks
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
SEAS 2025   14th International Conference on Software Engineering and Applications
ISCSO 2024   Multi-Objective Optimization Competition