posted by user: UniPi_SSL || 23602 views || tracked by 12 users: [display]

CyberICPS 2016 : 2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems

FacebookTwitterLinkedInGoogle

Link: http://www.ds.unipi.gr/cybericps2016/
 
When Sep 26, 2016 - Sep 30, 2016
Where Heraklion, Greece
Submission Deadline Jun 26, 2016
Notification Due Jul 25, 2016
Final Version Due Aug 12, 2016
Categories    security   cyber-physical systems   incident response   digital forensics
 

Call For Papers

************************************************************************************
2nd Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2016)
in conjunction with ESORICS 2016
Heraklion, Greece, September 26-30, 2016
************************************************************************************


The 2nd Workshop on the Security of Industrial Control Systems and of Cyber- Physical Systems (CyberICPS 2016) will be held in Heraklion, Crete, Greece, in conjunction with ESORICS 2016, in September 2016. CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2016.

Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS).

As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber- space, by offering a forum for discussion on all issues related to their cyber security.

CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

•Security governance
- Security policies
- Risk analysis and management
- Vulnerability assessment and metrics
- Awareness, training and simulation
- ICS/CPS security standards
- Privacy and Anonymity in ICS/CPS

•System and network security
- Threat modeling
- Security architectures
- Access control
- Malware and cyber weapons
- Intrusion detection and visualisation
- Defense in depth
- Monitoring and real time supervision
- Applied cryptography
- Perimeter security
- Safety-security interactions
- Cyber security engineering
- Secure communication protocols
- Formal models for ICS/CPS security
- Hardware Security
- Resilient ICS/CPS
- Application Security
- Secure Firmware

•Incident Response and Digital Forensics for ICS/CPS
- Forensics in ICS
- Incident Response
- Accountability

•Case Studies
- Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

Submissions
============

Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 16 pages long, including the bibliography and well-marked appendices, and should follow the LNCS style (http://www.springeronline.com/lncs). Submissions are to be made to the submission web site at https://easychair.org/conferences/?conf=cybericps2016. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of June the 26th, 2016 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. Pre-proceedings will be made available at the workshop. It is planned to have post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series.

Important dates
================

Submission deadline: 15 July 2016
Notification to authors: 15 August 2016
Camera ready due: 29 August 2016

Organization
=============

•General Chairs
- Frederic Cuppens, Telecom Bretagne, France
- Sokratis Katsikas, Norwegian University of Science and Technology, Norway

•Program Chairs
- Nora Cuppens-Bulahia, Telecom Bretagne, France
- Costas Lambrinoudakis, University of Piraeus, Greece

•Technical Program Committee
- Hervé Debar, Telecom Sudparis, France
- Jozef Vyskoc, VAF, Slovakia
- Juha Röning, University of Oulu, Finland
- Mauro Conti, University of Padua, Italy
- Stefano Zanero, Politecnico di Milano, Italy
- Stephen Wolthusen, Royal Holloway, UK
- Wael Kanoun, Alcatel-Lucent (Bell Labs), France
- Weizhi Meng, Institute for Infocomm Research, Singapore
- Yves Roudier, EURECOM, France
- Chris Mitchell, Royal Holloway, UK
- Cristina Alcaraz, University of Malaga, Spain
- David Espes, University of Brest, France
- Dieter Gollmann, Technical University of Hamburg, Germany
- Mourat Debbabi, Concordia University, Canada
- Sjouke Mauw, University of Luxembourg, Luxembourg
- Samiha Ayed, Telecom Bretagne, France


•PC chairs email
- Nora Cuppens-Bulahia, nora.cuppens@telecom-bretagne.eu
- Costas Lambrinoudakis, clam@unipi.gr

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ICoIV 2024   2024 International Conference on Intelligent Vehicles (ICoIV 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
IEEE ICCR 2024   IEEE--2024 6th International Conference on Control and Robotics (ICCR 2024)
CIIS 2024   ACM--2024 7th International Conference on Computational Intelligence and Intelligent Systems (CIIS 2024)