posted by system || 3904 views || tracked by 2 users: [display]

SCPS 2015 : CRC Book - Securing Cyber Physical Systems


When N/A
Where USA
Submission Deadline Sep 30, 2014
Notification Due Jan 5, 2015
Final Version Due Feb 5, 2015

Call For Papers


Securing Cyber Physical Systems
To be Published by CRC Press, USA

Cyber-Physical System (CPS) is a relatively new term coined in the field of interconnected devices and networks that enhances the notion of Cyberspace. It offers a kind of Cyberspace based on good number of interconnected physical devices each of which is run by sophisticated embedded systems and software. Checking the history, we find that the initial promoters of this idea had strong background in software engineering technologies for embedded software, working on standalone systems. Hence, from their perspective, they focused on a single embedded system. When the idea of CPS was being developed, it considered how to make it possible that multiple embedded control systems can interact among themselves through communications and physical environments (e.g., from one's actuators to other one's sensors). Apart from this, many other networking and software development issues were raised like how to model, design, implement, and test software, how to consider and reflect uncertainty and heterogeneity due to the integration within the development phase, how to provide reliability and dependability on such systems, how to maintain such systems, and so on. Recently, security topics in CPS have come forward. The question however is whether the CPS’s structure changes the security requirements of those present in the areas of Internet of Things (IoT), M2M (Machine to Machine), or such communications? With multiple definitions of CPS today, the security issue is still an open field and many are linking CPS security with their own field of research. Some from programming or software engineering point of view, some with middleware/OS (operative system) point of view, and some with IoT, M2M, or such technologies. In fact, the security techniques in other fields would also help CPS security. The term is indeed attractive but the skeleton behind the technology is kind of the same on which different other security technologies may work. General works on IoT for instance, would also be relevant to such an interconnected system. This book aims to address these issues covering different mechanisms related to CPS security. Different types of thoughts on these issues are welcome. The topics should cover the following and other related issues (but not limited to these, if related to CPS security):

- Security protocol development for CPS;
- Access control techniques for CPS;
- Secure CPS architectures;
- Key management in CPS;
- Intrusion detection for CPS;
- Security of embedded systems;
- Security of CPS in various engineering applications;
- Security of industrial control systems related to CPS;
- Security of Internet-of-Things;
- M2M security in the context of CPS;
- RFID Applications security in Cyber-Physical System;

Submission Instructions

Each manuscript should be written in a tutorial manner with enough details so that it can be easily accessible for the readers outside the specialty of the area. Expected manuscript length is between 9,500 to 12,500 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (doc or docx). Kindly do not use any special formatting or macro for the submission version, doc or docx file. General guideline is: Use A4 page with 1 inch (or, 2.54 cm) margin on all sides, single column format, 1.5 line spacing with 11 point sized font, Times New Roman. An all-in-one PDF file may be submitted for the initial submission however, if the chapter is accepted, this formatting style must be followed and MS-Office file must be supplied.

A chapter proposal should be sent to the editor as soon as possible. Please email to both and

Important Dates

Full Manuscript Submission: 30 September, 2014 (Extended Deadline)
Notification (Last Date): January 05, 2015
Final/Revised Manuscript: February 05, 2015
Publication Time: 2015 (2nd half) -Tentative

Editor Contact Information

Al-Sakib Khan Pathan
Department of Computer Science, KICT,
International Islamic University Malaysia (IIUM), Malaysia
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: ,


Al-Sakib Khan Pathan, Ph.D., SMIEEE
Founding Head, NDC Laboratory, KICT, IIUM

Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

Personal URL1:
Personal URL2:


Related Resources

ICCPS 2019   The 10th ACM/IEEE International Conference on Cyber-Physical Systems
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ISMDMA 2018) 2018   2018 2nd International Symposium on Mechanical Design, Manufacture and Automation(ISMDMA 2018)
CPN 2019   IEEE Workshop on Cyber-Physical Networking
Special Topics on Cybersecurity 2019   Special Topics on Cybersecurity - The 5th International Conference on Communication, Management and Information Technology
HSCC 2019   22nd ACM International Conference on Hybrid Systems: Computation and Control
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
SecCPS 2019   Workshop on Security issues in Cyber-Physical System(SecCPS)
ICM 2018   Energy Efficient Cyber Physical Systems Special Session at 30th International Conference on Microelectronics
CRC--IEEE, Ei Compendex & Scopus 2018   2018 the 3rd International Conference on Cybernetics, Robotics and Control (CRC 2018)--IEEE, Ei Compendex & Scopus