posted by user: kevinjones || 1595 views || tracked by 5 users: [display]

ICS-CSR 2014 : 2nd International Symposium for ICS & SCADA Cyber Security Research 2014

FacebookTwitterLinkedInGoogle

Link: http://www.ics-csr.com
 
When Sep 11, 2014 - Sep 12, 2014
Where Austria
Submission Deadline May 16, 2014
Notification Due Jun 23, 2014
Final Version Due Jul 12, 2014
Categories    SCADA   industrial control system   critical infrastructure   cyber security
 

Call For Papers

Call for Papers
2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
www.ics-csr.com
11 - 12 September 2014
University of Applied Sciences, St Polten, Austria


The 2nd International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest.

We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

Research Themes & Topics of Interest:

SCADA Hardware Security Solutions
- Encryption, Authentication, Availability Assurance
- Resilient Systems
- Application security
- Secure Firmware
- Timing Vulnerabilities in RT-Control Systems
- Security Implications of Feature Interactions
SCADA System Security
- Security architectures
- Safety-Security Interactions
- Intrusion detection
- Malware Analysis
- Cyber Security Engineering
- Vulnerability
Assessment/Screening
- Secure Communication Protocols
- Metrics
- Anonymity
- Language-based security
- Network security
SCADA Forensics
- Hardware Forensics
- Incidence Response
- Live Forensics
- Accountability
Human Factors Security
- Awareness & Training
- Behavioural Modelling
- Threat Profiling

This topic list is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems, or Industrial Control, however, will be considered out of scope and may be rejected without full review.


Important Dates (All deadlines are 23:59 CET)

Paper Submission due: 16 May 2014
Acceptance notification: 23 June 2014
Revised papers due: 12 July 2014


Instructions for Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be published in conference proceedings and indexed in the ACM digital library.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. The program committee will select a Best Paper Award winner for this conference. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Submit your paper via EasyChair:
https://www.easychair.org/conferences/?conf=icscsr2014

Instructions for Short Positional Paper Submission

We welcome the submission of short positional papers for poster presentation during the conference. Positional papers must be clearly presented in English, must not exceed 4 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: http://ewic.bcs.org/category/15364. Accepted papers will be eligible for inclusion for presentation as a poster during the conference and selected papers will be included as an annex in the published conference proceedings.

Submit your short positional paper via EasyChair: https://www.easychair.org/conferences/?conf=icscsr2014 and use the prefix "POSITIONAL:" in the registration title.

Related Resources

ICS 2017   International Conference on Supercomputing
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
SI: Cyber Forensics&Threat Intelligence 2017   IEEE Transactions on Sustainable Computing SI on Sustainable Cyber Forensics and Threat Intelligence
DMCS 2017   DMCS - Data Mining for Cyber Security 2017 (collocated with IEEE ICDM'17)
ISSA 2017   International workshop on Interplay of Security, Safety and System/Software Architecture
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
CCOE - CFP 2017   Cyber Center of Excellence (CCOE) Call For Research Papers
CFC-Data Analytics/Smart Cities 2017   Call for Chapters (Taylor & Francis): Data Analytics Applications for Smart Cities
MISC.conf 2017   MISC.conf Security Conference
WCICSS 2017   The World Congress on Industrial Control Systems Security