posted by organizer: bayforsec || 6531 views || tracked by 5 users: [display]

SHCIS 2015 : 2nd Workshop on Security in highly connected IT systems


When Sep 21, 2015 - Sep 22, 2015
Where Vienna
Submission Deadline May 20, 2015
Notification Due Jun 22, 2015
Final Version Due Jul 17, 2015
Categories    computer science   network security   security   cyber security

Call For Papers

SHCIS ’15 – 2nd Workshop on Security in highly connected IT systems
Held in conjunction with
20th European Symposium on Research in Computer Security- ESORICS 2015
Vienna, Austria, September 21-25, 2015 (

Modern society over the course of the past two decades developed an
increasing dependency on their infrastructures in general, and on the
availability and correct functionality of their IT systems in particular.
While in the early days of the Internet revolution not many IT systems
outside the academic world were directly connected to the Internet, the
benefits of internetworking began to prevail by the end of the last
millennium. Nowadays, all kinds of IT systems, from industrial control
systems to nationwide sensor networks, from high-traffic business
platforms to e-health applications, are connected to the Internet and
thus directly connected to each other. Such highly connected IT systems
exhibit their very own peculiarities and need to be studied accordingly.

In this context, SHCIS’15 aims to bring together IT security researchers
and practitioners active in the field of highly-connected IT-systems,
with a strong emphasis on interdisciplinary aspects. The focus of the
workshop is on diffusion of early and ongoing work, with large room being
devoted to presentations of PhD students active in this field and large
scale national and international research projects. Suggested topics
are aligned along a cyclic IT security process for highly connected IT
systems, consisting of the phases “Preventive measures against attacks”,
“Defense against ongoing attacks”, and “Forensics and post-mortem
Examination of relevant IT-security incidents”. The workshop is organized
by the Bavarian Research Alliance FORSEC with focus on the security of
highly connected IT-Systems (

Suggested topics should be closely related to highly-connected IT-systems
and include, but are not limited to:
- Secure distributed architectures
- Secure mobile architectures
- Secure embedded systems
- Security in sensor networks
- Secure cloud computing
- Code obfuscation
- Security economics
- Identity and access management
- Privacy
- Online trust in large-scale systems
- Human factors in security and privacy
- Digital forensics
- Security through virtualization
- Security in virtualized environments
- Security in mobile computing
- Detection of security related anomalies

Relevant application areas include, but are not limited to:
- Virtualization platforms
- Smart grids, smart cities
- Social networks
- Big data applications
- Cloud services
- Business applications
- Transport and logistics
- E-Commerce

Workshop chairs
Günther Pernul, Guido Schryen, Rolf Schillinger
Bavarian Research Alliance FORSEC – Security of highly-connected IT-Systems

Submission Guideline
Authors are invited to publish original and unpublished research that is not
currently in a review process for other workshops, conferences or journals.
The focus of the workshop is on diffusion of early and ongoing work, with
large room being devoted to presentations of PhD students active in this
and large scale national and international research projects. Papers must
be written in English and formatted according to the IEEE Proceedings format

Camera ready versions of the accepted papers must not exceed a length of 5
pages. At least one of the authors has to be attending the workshop to
present the paper. Submission will be handled electronically through

Important dates
Submission of full papers: May 20, 2015
Notification of acceptance: June 22, 2015
Camera-ready copies due: July 17, 2015

Program committee
Rainer Böhme, University of Münster, Germany
Zinaida Benenson, FAU Erlangen, Germany
Marijke Coetzee, University of Johannesburg, South Africa
Jorge Cuellar, Siemens AG, Germany
Steven Furnell, Plymouth University, UK
Benjamin Fabian, Humboldt University Berlin, Germany
Carmen Fernandez Gago, University of Madrid, Spain
Danilo Gligoroski, Norwegian University of Science and Technology, Norway
Martin Gilje Jaatun, SINTEF, Norway
Thomas Kittel, Technical University Munich, Germany
Lambrinoudakis Kostas, University of the Aegean, Greece
Hanna Krasnova, University of Bern, Switzerland
Emil C. Lupu, Imperial College London, UK
Tilo Müller, FAU Erlangen, Germany
Rolf Oppliger, eSecurity Technologies, Switzerland
Moussa Ouedraogo, Luxembourg Institute of Science and Technology,
Hans Reiser, University of Passau, Germany
Heiko Roßnagel, Fraunhofer IAO, Germany
Thomas Schaberreiter, University of Oulu, Finland
Sven Wohlgemuth, CASED Darmstadt, Germany

Related Resources

Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ATCES--SCOPUS 2021   5th International Conference on Aerospace Technology, Communications and Energy Systems (ATCES 2021)
CiVEJ 2020   Civil Engineering and Urban Planning: An International Journal
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [Second Round: 11 December 2020]
ITE 2021   2nd International Conference on Integrating Technology in Education
IROS 2021   International Conference on Intelligent Robots and Systems
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)
UVS-Oman 2022   The 2nd International Conference on Unmanned Vehicle Systems (UVS-Oman 2022) - IEEE