posted by user: vgkioulos || 2148 views || tracked by 3 users: [display]

CyberICPS 2022 : 8th Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems

FacebookTwitterLinkedInGoogle

Link: https://www.ds.unipi.gr/cybericps2022/
 
When Sep 26, 2022 - Sep 30, 2022
Where Copenhagen, Denmark
Submission Deadline Jul 22, 2022
Notification Due Aug 26, 2022
Final Version Due Sep 17, 2022
Categories    security   network security   cyber security   computer security
 

Call For Papers

CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015.

Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). These systems also include the emerging trend of Industrial Internet of Things (IIoT) that will be the central part of the fourth industrial revolution.

As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.
Topics

CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

Security Governance
Security policies
Risk analysis and management
Vulnerability assessment and metrics
Awareness, training and simulation
ICS/CPS security standards
Privacy and Anonymity in ICS/CPS
Cyber crisis management
System and Network Security
Threat modeling
Security architectures
Access control
Malware and cyber weapons
Intrusion detection and visualisation
Defense in depth
Monitoring and real time supervision
Applied cryptography
Perimeter security
Safety-security interactions
Cyber security engineering
Secure communication protocols
Formal models for ICS/CPS security
Hardware Security
Resilient ICS/CPS
Application Security
Secure Firmware
Incident Response and Digital Forensics for ICS/CPS
Forensics in ICS
Incident Response
Accountability
Case Studies
Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography
IARCE 2025   2025 5th International Conference on Industrial Automation, Robotics and Control Engineering
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
RAAI--EI 2025   2025 5th International Conference on Robotics, Automation, and Artificial Intelligence (RAAI 2025)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ICCR--EI 2025   2025 7th International Conference on Control and Robotics (ICCR 2025)
NTIJ 2025   Nanoscience and Technology: An International Journal
Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)