posted by organizer: bayforsec || 6424 views || tracked by 7 users: [display]

SHCIS 2014 : 1st Workshop on Security in highly connected IT systems


When Sep 1, 2014 - Sep 5, 2014
Where Munich
Submission Deadline Apr 5, 2014
Notification Due Apr 28, 2014
Final Version Due May 31, 2014
Categories    computer science   security   network security   cyber security

Call For Papers

SHCIS ’14 - 1st Workshop on Security in highly connected IT systems
Held in parallel with
11th International Conference on Trust, Privacy & Security in
Digital Business - TrustBus 2014

Munich, Germany, September 1-5, 2014

Modern society over the course of the past two decades developed
an increasing dependency on their infrastructures in general, and
on the availability and correct functionality of their IT systems
in particular. While in the early days of the Internet revolution
not many IT systems outside the academic world were directly
connected to the Internet, the benefits of internetworking began
to prevail by the end of the last millennium. Nowadays, all kinds
of IT systems, from industrial control systems to nationwide sensor
networks, from high-traffic business platforms to e-health
applications, are connected to the Internet and thus, directly
connected to each other. Such highly connected IT systems exhibit
their very own peculiarities and need to be studied accordingly.

In this context, SHCIS’14 has two different, yet closely related
goals. Firstly, the organizers of this workshop want to bring
together IT security alliances and institutions with their global
counterparts in order to strengthen collaboration and sharing of
knowledge and research results between these entities.
FORSEC ( and Secure Business Austria
( in particular, have committed
themselves to participating in this workshop by providing
members of the program committee as well as planning to contribute
through participation and publications.

In addition to FORSEC and Secure Business Austria, we cordially
invite participants from other national and international IT
security alliances and institutions.

Secondly, SHCIS’14 aims to bring together IT security researchers
and practitioners in the area of highly connected IT systems, with
a strong emphasis on interdisciplinary aspects. The focus on the
workshop is on diffusion of ongoing work and currently running
research projects. Suggested topics are aligned along a cyclic IT
security process for highly connected IT systems, consisting of the
following phases:
- Preventive measures against attacks
- Defense against ongoing attacks
- Forensics and post-mortem examination of IT-security incidents

Suggested topics include, but are not limited to:
- Secure distributed architectures
- Secure mobile architectures
- Secure embedded systems
- Security in sensor networks
- Secure cloud computing
- Code obfuscation
- Security Economics
- Identity management - Privacy
- Online trust
- Human factors in security and privacy
- Digital forensics
- Security through virtualization, security in virtualized environments
- Security in mobile computing
- Detection of security related anomalies

Relevant application areas include, but are not limited to:
- Virtualization platforms
- Smart grids, smart cities
- Social networks
- Big data

Workshop chairs
- Prof. Dr. Günther Pernul, Chair of Information Science I - Information Systems, University of Regensburg
- Prof. Dr. Guido Schryen, Department of Management Information Systems, University of Regensburg

Submission Guideline
Authors are invited to publish original and unpublished research
that is not currently in a review process for other workshops,
conferences or journals. Papers must be in English and formatted
according to the IEEE Proceedings format (description available at Camera ready
versions of the accepted papers must not exceed a length of 5 pages.
At least one of the authors has to be attending the workshop to
present the paper. All accepted papers will be published in the
proceedings of DEXA’14 Workshops with IEEE CSP. Submissions will be
handled electronically through
The site will be operating by mid February 2014.

Important dates
Submission of full papers: March 31, 2014
Notification of acceptance: April 28, 2014
Camera-ready copies due: May 31, 2014

Program committee

Related Resources

NordSec 2023   28th Nordic Conference on Secure IT systems (NordSec) 2023
EI-CFAIS 2023   2023 International Conference on Frontiers of Artificial Intelligence and Statistics (CFAIS 2023)
IIT 2023   15th International Conference on Innovations in Information Technology Nov 14 – 15, 2023. UAE
CSW 2023   2023 International Workshop on Cyber Security (CSW 2023)
GreeNet Symposium - SGNC 2023   14th Symposium on Green Networking and Computing (SGNC 2023)
Hacktivity 2023   Hacktivity 2023 - IT Security Festival, 20th Jubilee Edition
NISecurity 2023   2023 International Conference on Network and Information Security (NISecurity 2023)
ARIA 2023   10th International Conference on Artificial Intelligence & Applications
SoCAV 2024   2024 International Symposium on Connected and Autonomous Vehicles (SoCAV 2024)
IEEE Xplore-Ei/Scopus-CCCAI 2023   2023 International Conference on Communications, Computing and Artificial Intelligence (CCCAI 2023) -EI Compendex