posted by user: ahm_irf || 9720 views || tracked by 17 users: [display]

IJIS SCADA Security 2011 : International Journal of Information Security Special Issue on “SCADA and Control System Security”

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline Aug 21, 2011
Notification Due Dec 30, 2011
Final Version Due Feb 20, 2012
Categories    scada system   control system   security
 

Call For Papers

CALL FOR PAPERS

International Journal of Information Security
Springer

Special Issue on “SCADA and Control System Security”

Supervisory control and data acquisition (SCADA) and industrial control systems monitor and control a wide range of industrial and infrastructure processes such as manufacturing production lines, water treatment, fuel production and electricity distribution. Such systems are usually built using a variety of commodity computer and networking components, and are becoming increasingly interconnected with corporate and other Internet-visible networks. As a result, they face significant threats from internal and external actors. For example, the now famous Stuxnet (which is a Windows-specific computer worm containing a rootkit and four zero-day attacks) was specifically written to attack SCADA systems that alone caused multi-million dollars damages in 2010.

The critical requirement for high availability in SCADA and industrial control systems, along with the use of bespoke, resource constrained computing devices, legacy operating systems and proprietary software applications limits the applicability of traditional information security solutions. Thus, research focusing on devising security solutions that are applicable in the control systems context is imperative, as evidenced by the increased focus on the problem by governments worldwide.

This Special Issue aims to present the latest developments, trends and research solutions addressing security of the computers and networks used in SCADA and other industrial control systems. The topics of interest include but not limited to, intrusion detection and prevention, malware, vulnerability analysis of control systems protocols, digital forensics, application security and performance impact of security methods and tools in control systems. This list is not exhaustive and other relevant topics will be considered.

We solicit previously unpublished, original research papers as well as review articles (presenting state-of-the art research and creating clear understanding of a particular topic). Conference papers with significant improvement will also be considered, provided that authors have clearly identified the improvements in the paper and also highlight the changes to their previous paper.

Submission Guidelines:
Only high quality original work that has not been published or is not currently under review elsewhere will be considered.

Instructions for submission can be found http://www.springer.com/computer/security+and+cryptology/journal/10207. The submitted papers should be formatted according to the journal style and submitted via the journal web-based submission route at https://www.editorialmanager.com/ijis/

Each paper must be accompanied by a cover letter indicating that the submission is for the “Special Issue on SCADA and Control System Security”.

All papers will be reviewed on originality, quality and relevance to the journal and handled according to the normal standards of the journal.

Important Dates:
Submission Deadline: 21 August 2011
Acceptance notification: 30 December 2011
Final papers due: 20 February 2012
Publication: 2012 (tentative)

Guest Editorial Board:
Dr. Irfan Ahmed, Information Security Institute, Queensland University of Technology, Australia.

Dr. Martin Naedele, ABB Corporate Research, Switzerland.

Adj/Prof. Charles Palmer, Dartmouth College, USA & Director IBM's Institute for Advanced Security

Prof. Ryoichi Sasaki, Tokyo Denki University, Japan

Adj/A. Prof. Bradley Schatz, Queensland University of Technology, & Director Schatz Forensic, Australia.

Andrew West, Invensys Operations Management, Australia

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DSN 2019   Dependable Systems and Networks
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
IEEE S&P 2019   IEEE Symposium on Security and Privacy
NECO 2018   7th International Conference of Networks and Communications
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
ACNS 2019   International Conference on Applied Cryptography and Network Security