posted by user: kevinjones || 3096 views || tracked by 6 users: [display]

ICS-CSR 2014 : 2nd International Symposium for ICS & SCADA Cyber Security Research 2014

FacebookTwitterLinkedInGoogle

Link: http://www.ics-csr.com
 
When Sep 11, 2014 - Sep 12, 2014
Where Austria
Submission Deadline May 16, 2014
Notification Due Jun 23, 2014
Final Version Due Jul 12, 2014
Categories    SCADA   industrial control system   critical infrastructure   cyber security
 

Call For Papers

Call for Papers
2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
www.ics-csr.com
11 - 12 September 2014
University of Applied Sciences, St Polten, Austria


The 2nd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest.

We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Research Themes & Topics of Interest:

SCADA Hardware Security Solutions
- Encryption, Authentication, Availability Assurance
- Resilient Systems
- Application security
- Secure Firmware
- Timing Vulnerabilities in RT-Control Systems
- Security Implications of Feature Interactions
SCADA System Security
- Security architectures
- Safety-Security Interactions
- Intrusion detection
- Malware Analysis
- Cyber Security Engineering
- Vulnerability
Assessment/Screening
- Secure Communication Protocols
- Metrics
- Anonymity
- Language-based security
- Network security
SCADA Forensics
- Hardware Forensics
- Incidence Response
- Live Forensics
- Accountability
Human Factors Security
- Awareness & Training
- Behavioural Modelling
- Threat Profiling

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems, or Industrial Control, however, will be considered out of scope and may be rejected without full review.


Important Dates (All deadlines are 23:59 CET)

Paper Submission due: 16 May 2014
Acceptance notification: 23 June 2014
Revised papers due: 12 July 2014


Instructions for Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be published in conference proceedings and indexed in the ACM digital library.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair:
https://www.easychair.org/conferences/?conf=icscsr2014

Instructions for Short Positional Paper Submission

We welcome the submission of short positional papers for poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2014 and use the prefix "POSITIONAL:" in the registration title.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
ICS 2024   International Conference on Supercomputing
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
NLPAICS 2024   First International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
InCIT 2024   The 8th International Conference on Information Technology