posted by organizer: cristinaAcarazTello || 4983 views || tracked by 12 users: [display]

CPSS 2015 : 1st Cyber-Physical System Security Workshop

FacebookTwitterLinkedInGoogle

Link: http://icsd.i2r.a-star.edu.sg/cpss15
 
When Apr 14, 2015 - Apr 14, 2015
Where Singapore
Submission Deadline Dec 28, 2014
Notification Due Jan 31, 2015
Final Version Due Feb 10, 2015
Categories    cyber-physical systems   scada security   smart grid security   security of industrial control
 

Call For Papers

CPSS 2015
1st Cyber-Physical System Security Workshop (CPSS 2015)

Singapore -- April 14, 2015
http://icsd.i2r.a-star.edu.sg/cpss15

*** in conjunction with ACM AsiaCCS'15 ***

IMPORTANT DATES
Submission due: Dec 28, 2014
Notification: Jan 31, 2015
Camera-ready due: Feb 10, 2015

Cyber-Physical Systems (CPS) consist of large-scale interconnected
systems of heterogeneous components interacting with their physical
environments. There are a multitude of CPS devices and applications
being deployed to serve critical functions in our lives. The security
of CPS becomes extremely important. This workshop will provide a
platform for professionals from academia, government, and industry
to discuss how to address the increasing security challenges facing
CPS. Besides invited talks, we also seek novel submissions describing
theoretical and practical security solutions to CPS. Papers that are
pertinent to the security of embedded systems, SCADA, smart grid, and
critical infrastructure networks are all welcome, especially in the
domains of energy and transportation. Topics of interest include, but
are not limited to:

- Adaptive attack mitigation for CPS
- Authentication and access control for CPS
- Availability, recovery and auditing for CPS
- Data security and privacy for CPS
- Embedded systems security
- EV charging system security
- Intrusion detection for CPS
- Key management in CPS
- Legacy CPS system protection
- Lightweight crypto and security
- SCADA security
- Security of industrial control systems
- Smart grid security
- Threat modeling for CPS
- Urban transportation system security
- Vulnerability analysis for CPS
- Wireless sensor network security


Program Chairs:
---------------
Jianying Zhou (I2R, Singapore)
Douglas Jones (ADSC, Singapore)


Publicity Chairs:
-----------------
Eng Keong Lua (SingTel, Singapore)
Cristina Alcaraz (University of Malaga, Spain)


Program Committee:
------------------
Cristina Alcaraz (University of Malaga, Spain)
Basel Alomair (KACST, Saudi Arabia)
Man Ho Au (Hong Kong Polytechnic University, HK)
Levente Buttyan (BME, Hungary)
Alvaro Cardenas (UT Dallas, USA)
Aldar Chan (ASTRI, HK)
Sang-Yoon Chang (ADSC, Singapore)
Songqing Chen (George Mason University, USA)
Chen-Mou Cheng (National Taiwan University, Taiwan)
Mauro Conti (University of Padua, Italy)
Aurelien Francillon (EURECOM, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Felix Gomez-Marmol (NEC Labs, Germany)
Huaqun Guo (I2R, Singapore)
Ravishankar Iyer (UIUC, USA)
Zbigniew Kalbarczyk (UIUC, USA)
Aniket Kate (Saarland University, Germany)
Shinsaku Kiyomoto (KDDI, Japan)
Marina Krotofil (Hamburg University of Technology, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Corrado Leita (Lastline, UK)
Albert Levi (Sabanci University, Turkey)
Joseph Liu (I2R, Singapore)
Javier Lopez (University of Malaga, Spain)
Eng Keong Lua (SingTel, Singapore)
Masahiro Mambo (Kanazawa University, Japan)
Chris Mitchell (RHUL, UK)
David Naccache (ENS, France)
Michael Papay (Northrop Grumman, USA)
Radha Poovendran (University of Washington, USA)
Gokay Saldamli (Samsung, USA)
Pierangela Samarati (Universita` degli Studi di Milano, Italy)
Hung-Min Sun (National Tsing Hua University, Taiwan)
Tsuyoshi Takagi (Kyushu University, Japan)
Rui Tan (ADSC, Singapore)
Juan Tapiador (Universidad Carlos III de Madrid, Spain)
William Temple (ADSC, Singapore)
Nils Ole Tippenhauer (SUTD, Singapore)
Lingyu Wang (Concordia University, Canada)
Weiguo Wang (Thales, Singapore)
Jian Weng (Jinan University, China)
Yongdong Wu (I2R, Singapore)
Yang Xiang (Deakin University, Australia)
Qiang Yan (Google, Switzerland)
David Yau (SUTD, Singapore)
Peng Zhou (NTU, Singapore)


Submission Instructions:
------------------------
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or affiliations,
or obvious citations). Submissions must be in double-column ACM SIG
Proceedings format, and should not exceed 12 pages. Position papers and
short papers of 5 pages describing the work in progress are also welcome.
Only pdf files will be accepted. Authors of accepted papers must guarantee
that their papers will be presented at the workshop. At least one author
of the paper must be registered at the appropriate full conference rate.
Accepted papers will be published by ACM Press as the conference
proceedings in USB thumb drives and in the ACM Digital Library. There
will also be a best paper award.
--------------------------------------------------------------------------

Related Resources

17th IEEE MCSoC 2024   17th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip
GECPS 2024   IEEE Cyber Physical System for Green Energy
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EMSICC 2024   International Workshop on Energy Management for Sustainable Internet-of-Things and Cloud Computing
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
RTCSA 2024   30th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
IJIS Special Issue 2024   Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
InCIT 2024   The 8th International Conference on Information Technology
ICONSEC 2024   3rd International Conference On Cyber Security and Digital Forensics