posted by system || 3857 views || tracked by 2 users: [display]

SCPS 2015 : CRC Book - Securing Cyber Physical Systems


When N/A
Where USA
Submission Deadline Sep 30, 2014
Notification Due Jan 5, 2015
Final Version Due Feb 5, 2015

Call For Papers


Securing Cyber Physical Systems
To be Published by CRC Press, USA

Cyber-Physical System (CPS) is a relatively new term coined in the field of interconnected devices and networks that enhances the notion of Cyberspace. It offers a kind of Cyberspace based on good number of interconnected physical devices each of which is run by sophisticated embedded systems and software. Checking the history, we find that the initial promoters of this idea had strong background in software engineering technologies for embedded software, working on standalone systems. Hence, from their perspective, they focused on a single embedded system. When the idea of CPS was being developed, it considered how to make it possible that multiple embedded control systems can interact among themselves through communications and physical environments (e.g., from one's actuators to other one's sensors). Apart from this, many other networking and software development issues were raised like how to model, design, implement, and test software, how to consider and reflect uncertainty and heterogeneity due to the integration within the development phase, how to provide reliability and dependability on such systems, how to maintain such systems, and so on. Recently, security topics in CPS have come forward. The question however is whether the CPS’s structure changes the security requirements of those present in the areas of Internet of Things (IoT), M2M (Machine to Machine), or such communications? With multiple definitions of CPS today, the security issue is still an open field and many are linking CPS security with their own field of research. Some from programming or software engineering point of view, some with middleware/OS (operative system) point of view, and some with IoT, M2M, or such technologies. In fact, the security techniques in other fields would also help CPS security. The term is indeed attractive but the skeleton behind the technology is kind of the same on which different other security technologies may work. General works on IoT for instance, would also be relevant to such an interconnected system. This book aims to address these issues covering different mechanisms related to CPS security. Different types of thoughts on these issues are welcome. The topics should cover the following and other related issues (but not limited to these, if related to CPS security):

- Security protocol development for CPS;
- Access control techniques for CPS;
- Secure CPS architectures;
- Key management in CPS;
- Intrusion detection for CPS;
- Security of embedded systems;
- Security of CPS in various engineering applications;
- Security of industrial control systems related to CPS;
- Security of Internet-of-Things;
- M2M security in the context of CPS;
- RFID Applications security in Cyber-Physical System;

Submission Instructions

Each manuscript should be written in a tutorial manner with enough details so that it can be easily accessible for the readers outside the specialty of the area. Expected manuscript length is between 9,500 to 12,500 words. Longer manuscripts may be allowed based on the topic and need. Manuscripts submitted for the book must be original, must not be previously published or currently under review anywhere. The manuscript must be prepared with MS-Office (doc or docx). Kindly do not use any special formatting or macro for the submission version, doc or docx file. General guideline is: Use A4 page with 1 inch (or, 2.54 cm) margin on all sides, single column format, 1.5 line spacing with 11 point sized font, Times New Roman. An all-in-one PDF file may be submitted for the initial submission however, if the chapter is accepted, this formatting style must be followed and MS-Office file must be supplied.

A chapter proposal should be sent to the editor as soon as possible. Please email to both and

Important Dates

Full Manuscript Submission: 30 September, 2014 (Extended Deadline)
Notification (Last Date): January 05, 2015
Final/Revised Manuscript: February 05, 2015
Publication Time: 2015 (2nd half) -Tentative

Editor Contact Information

Al-Sakib Khan Pathan
Department of Computer Science, KICT,
International Islamic University Malaysia (IIUM), Malaysia
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: ,


Al-Sakib Khan Pathan, Ph.D., SMIEEE
Founding Head, NDC Laboratory, KICT, IIUM

Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

Personal URL1:
Personal URL2:


Related Resources

CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
EI CPSIOT 2018   2018 International Conference on Cyber Physical Systems and IoT(CPSIOT 2018)
[CFP] IEEE IoT Journal Special Issue 2018   [CFP] IEEE IoT Journal - Special Issue on Reliable and Resilient Cyber-Physical Systems
RESACS 2018   Fourth International Workshop on Requirements Engineering for Self-Adaptive, Collaborative, and Cyber-Physical Systems
APCCAS--IEEE, Ei and Scopus 2018   IEEE--2018 14th Asia Pacific Conference on Circuits and Systems (APCCAS 2018)--Ei Compendex and Scopus
RealWSN 2018   7th International Workshop on Real-World Embedded Wireless Systems and Networks (RealWSN'18)
TRIDENTCOM (Ei, ISI, Scopus) 2018   13th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities -- Ei Compendex, ISI Web of Science, Scopus
CyPhy 2018   Workshop on Model-Based Design of Cyber Physical Systems
IJCNC 2018   Cyber Physical Systems --Intl J. of Computer Networks & Communications -- Scopus , ERA Indexed