posted by organizer: marmusha || 2676 views || tracked by 3 users: [display]

CLASS2014 2014 : 1st SCADA Security Conference LATAM


When Nov 5, 2014 - Nov 7, 2014
Where Rio de Janeiro, Brazil
Submission Deadline Jun 16, 2014
Notification Due Aug 6, 2014
Final Version Due Aug 30, 2014
Categories    SCADA   security   embedded system   control systems

Call For Papers

We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructures.

ICS Governance

Security policies
Risk Management
Vulnerability Assessment/Screening
Awareness and Training
New SCADA Security standards / updates in existing standards

SCADA System Security

Malware and Cyber weapons
Perimeter Security
Intrusion Detection
Access Control in SCADA systems
Defense in depth
Security Architectures
Safety-Security Interactions
Cyber Security Engineering
Secure Communication Protocols
Language-based Security

SCADA Hardware Security Solutions

Resilient Systems
Application Security
Secure Firmware

SCADA Monitoring and Forensics

Continuous Monitoring
Forensics in industrial networks and SCADA
Hardware Forensics
Incident Response
Live Forensics
Digital Laws

New SCADA security technologies

Implementation of solutions for automation security
Attacks and sabotage against industrial facilities

This topic list is not meant to be exhaustive, the conference is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA Security, Embedded Systems or Industrial Control, however, will be considered out of scope and may be rejected without full review.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, Spanish or Portuguese and must not exceed 10 pages, including tables, figures, references and appendixes and follow the EWIC formatting guidelines: Accepted papers will be published in the conference website.

All papers will be peer reviewed by members of the Programme Committee. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Distinguished papers, after further revisions, will be considered for publication in a special issue. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Important Dates:

Paper Submission Due: June 16, 2014
Acceptance Notification: August 06, 2014
Revised Papers Due: Augus 30, 2014
Early Bird Registration: by August 18, 2014
Registration: by September 16, 2014
Late Registration: after September 16, 2014

Related Resources

IJISS 2016   International Journal of Information Security Science (IJISS)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
CPSS 2017   3rd ACM Cyber‐Physical System Security Workshop