posted by user: kevinjones || 1748 views || tracked by 5 users: [display]

ICS-CSR 2014 : 2nd International Symposium for ICS & SCADA Cyber Security Research 2014

FacebookTwitterLinkedInGoogle

Link: http://www.ics-csr.com
 
When Sep 11, 2014 - Sep 12, 2014
Where Austria
Submission Deadline May 16, 2014
Notification Due Jun 23, 2014
Final Version Due Jul 12, 2014
Categories    SCADA   industrial control system   critical infrastructure   cyber security
 

Call For Papers

Call for Papers
2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
www.ics-csr.com
11 - 12 September 2014
University of Applied Sciences, St Polten, Austria


The 2nd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest.

We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Research Themes & Topics of Interest:

SCADA Hardware Security Solutions
- Encryption, Authentication, Availability Assurance
- Resilient Systems
- Application security
- Secure Firmware
- Timing Vulnerabilities in RT-Control Systems
- Security Implications of Feature Interactions
SCADA System Security
- Security architectures
- Safety-Security Interactions
- Intrusion detection
- Malware Analysis
- Cyber Security Engineering
- Vulnerability
Assessment/Screening
- Secure Communication Protocols
- Metrics
- Anonymity
- Language-based security
- Network security
SCADA Forensics
- Hardware Forensics
- Incidence Response
- Live Forensics
- Accountability
Human Factors Security
- Awareness & Training
- Behavioural Modelling
- Threat Profiling

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems, or Industrial Control, however, will be considered out of scope and may be rejected without full review.


Important Dates (All deadlines are 23:59 CET)

Paper Submission due: 16 May 2014
Acceptance notification: 23 June 2014
Revised papers due: 12 July 2014


Instructions for Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be published in conference proceedings and indexed in the ACM digital library.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair:
https://www.easychair.org/conferences/?conf=icscsr2014

Instructions for Short Positional Paper Submission

We welcome the submission of short positional papers for poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2014 and use the prefix "POSITIONAL:" in the registration title.

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
ICS 2017   International Conference on Supercomputing
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ICS 2018   the 32nd ACM International Conference on Supercomputing
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
CyberSA 2018   IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment
CyCon 2018   10th IEEE International Conference on Cyber Conflict (CyCon X)
SSSCC 2018   Smart, Sustainable and Safe Cities Conference