posted by system || 3112 views || tracked by 2 users: [display]

SCPS 2015 : CRC Book - Securing Cyber Physical Systems


When N/A
Where USA
Submission Deadline Sep 30, 2014
Notification Due Jan 5, 2015
Final Version Due Feb 5, 2015

Call For Papers


Securing Cyber Physical Systems
To be Published by CRC Press, USA

Cyber-Physical System (CPS) is a relatively new term coined in the field of interconnected devices and networks that enhances the notion of Cyberspace. It offers a kind of Cyberspace based on good number of interconnected physical devices each of which is run by sophisticated embedded systems and software. Checking the history, we find that the initial promoters of this idea had strong background in software engineering technologies for embedded software, working on standalone systems. Hence, from their perspective, they focused on a single embedded system. When the idea of CPS was being developed, it considered how to make it possible that multiple embedded control systems can interact among themselves through communications and physical environments (e.g., from one's actuators to other one's sensors). Apart from this, many other networking and software development issues were raised like how to model, design, implement, and test software, how to consider and reflect uncertainty and heterogeneity due to the integration within the development phase, how to provide reliability and dependability on such systems, how to maintain such systems, and so on. Recently, security topics in CPS have come forward. The question however is whether the CPS’s structure changes the security requirements of those present in the areas of Internet of Things (IoT), M2M (Machine to Machine), or such communications? With multiple definitions of CPS today, the security issue is still an open field and many are linking CPS security with their own field of research. Some from programming or software engineering point of view, some with middleware/OS (operative system) point of view, and some with IoT, M2M, or such technologies. In fact, the security techniques in other fields would also help CPS security. The term is indeed attractive but the skeleton behind the technology is kind of the same on which different other security technologies may work. General works on IoT for instance, would also be relevant to such an interconnected system. This book aims to address these issues covering different mechanisms related to CPS security. Different types of thoughts on these issues are welcome. The topics should cover the following and other related issues (but not limited to these, if related to CPS security):

- Security protocol development for CPS;
- Access control techniques for CPS;
- Secure CPS architectures;
- Key management in CPS;
- Intrusion detection for CPS;
- Security of embedded systems;
- Security of CPS in various engineering applications;
- Security of industrial control systems related to CPS;
- Security of Internet-of-Things;
- M2M security in the context of CPS;
- RFID Applications security in Cyber-Physical System;

Submission Instructions

Each manuscript should be written in a tutorial manner with enough details so that it can be easily accessible for the readers outside the specialty of the area. Expected manuscript length is between 9,500 to 12,500 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (doc or docx). Kindly do not use any special formatting or macro for the submission version, doc or docx file. General guideline is: Use A4 page with 1 inch (or, 2.54 cm) margin on all sides, single column format, 1.5 line spacing with 11 point sized font, Times New Roman. An all-in-one PDF file may be submitted for the initial submission however, if the chapter is accepted, this formatting style must be followed and MS-Office file must be supplied.

A chapter proposal should be sent to the editor as soon as possible. Please email to both and

Important Dates

Full Manuscript Submission: 30 September, 2014 (Extended Deadline)
Notification (Last Date): January 05, 2015
Final/Revised Manuscript: February 05, 2015
Publication Time: 2015 (2nd half) -Tentative

Editor Contact Information

Al-Sakib Khan Pathan
Department of Computer Science, KICT,
International Islamic University Malaysia (IIUM), Malaysia
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: ,


Al-Sakib Khan Pathan, Ph.D., SMIEEE
Founding Head, NDC Laboratory, KICT, IIUM

Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

Personal URL1:
Personal URL2:


Related Resources

SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
Networks of the Future 2017   Call for book chapters- Networks of the Future (Internet of Things, Cloud Computing, SDN, Big Data, 5G) CRC Press (extended)
CCNCPS 2017   The second International workshop on Communication, Computing, and Networking in Cyber Physical Systems
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
SCPE_CCNCPS 2017   Special issue on Communication, Computing, and Networking in Cyber-Physical Systems
CPSS 2017   3rd ACM Cyber‐Physical System Security Workshop
CyberSciTech 2017   The IEEE Cyber Science and Technology Congress 2017
CPSCom 2017   The 10th IEEE International Conference on Cyber, Physical and Social Computing
IoIT 2017   Internet of Intelligent and Autonomic Things along with ICAS (International Conference on Autonomic and Autonomous Systems) 2017
FormaliSE 2017   FME Workshop on Formal Methods in Software Engineering