posted by user: kevinjones || 1838 views || tracked by 5 users: [display]

ICS-CSR 2014 : 2nd International Symposium for ICS & SCADA Cyber Security Research 2014


When Sep 11, 2014 - Sep 12, 2014
Where Austria
Submission Deadline May 16, 2014
Notification Due Jun 23, 2014
Final Version Due Jul 12, 2014
Categories    SCADA   industrial control system   critical infrastructure   cyber security

Call For Papers

Call for Papers
2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
11 - 12 September 2014
University of Applied Sciences, St Polten, Austria

The 2nd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest.

We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Research Themes & Topics of Interest:

SCADA Hardware Security Solutions
- Encryption, Authentication, Availability Assurance
- Resilient Systems
- Application security
- Secure Firmware
- Timing Vulnerabilities in RT-Control Systems
- Security Implications of Feature Interactions
SCADA System Security
- Security architectures
- Safety-Security Interactions
- Intrusion detection
- Malware Analysis
- Cyber Security Engineering
- Vulnerability
- Secure Communication Protocols
- Metrics
- Anonymity
- Language-based security
- Network security
SCADA Forensics
- Hardware Forensics
- Incidence Response
- Live Forensics
- Accountability
Human Factors Security
- Awareness & Training
- Behavioural Modelling
- Threat Profiling

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems, or Industrial Control, however, will be considered out of scope and may be rejected without full review.

Important Dates (All deadlines are 23:59 CET)

Paper Submission due: 16 May 2014
Acceptance notification: 23 June 2014
Revised papers due: 12 July 2014

Instructions for Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: Accepted papers will be published in conference proceedings and indexed in the ACM digital library.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair:

Instructions for Short Positional Paper Submission

We welcome the submission of short positional papers for poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: and use the prefix "POSITIONAL:" in the registration title.

Related Resources

ICS 2018   the 32nd ACM International Conference on Supercomputing
eCrime 2018   IEEE 13th Symposium on Electronic Crime Research
SciSec 2018   The 1st International Conference on Science of Cyber Security
IJCI 2018   International Journal on Cybernetics & Informatics
CUING 2018   Criminal Use of Information Hiding
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
CyberSciTech 2018   The 3rd IEEE Cyber Science and Technology Congress
Call for Chapters 2018   CFC - Book: Secure Cyber-Physical Systems for Smart Cities (Proposal Submission Deadline: February 28, 2018)
WTMC 2018   International Workshop on Traffic Measurements for Cybersecurity
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus