posted by organizer: RedaYaich || 3628 views || tracked by 5 users: [display]

CyberICS 2015 : International Workshop on Cybersecurity of Industrial Control Systems

FacebookTwitterLinkedInGoogle

Link: http://conferences.telecom-bretagne.eu/cyberics/2015/
 
When Sep 21, 2015 - Sep 22, 2015
Where Vienna
Submission Deadline Jul 5, 2015
Notification Due Jul 31, 2015
Final Version Due Aug 7, 2015
Categories    security   SCADA   industrial control systems   policies
 

Call For Papers

————— CALL FOR PAPERS -- CyberICS2015 —————
1st International Workshop on Cybersecurity of Industrial Control Systems (CyberICS)
co-located with ESORICS 2015
September 21-22, 2015
Vienna, Austria
Website : http://conferences.telecom-bretagne.eu/cyberics/2015/
**** Our apologies if you receive multiple copies of this CFP.****
————— —————


SCOPE :

The First Cyber ICS workshop aims to address the increasing number of cyber threats that operators of Industrial Control Systems (ICS) have to face around the world. The workshop will bring together researchers, engineers and governmental actors with an interest in the security of industrial control systems in the context of their increasing exposure to cyber-space.

The workshop will focus on topics covering ICSs, including cyber protection and cyber defense of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other industrial control system.

TOPICS :
The Cyber ICS workshop seeks submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics, including (but not limited to) the following ones:
ICS Governance

Security policies
Risk analysis and management
Vulnerability assessment and metrics
Awareness, training and simulation
New ICS security standards / updates in existing standards

ICS System and Network Security

Security architectures
Access control in ICS systems
Malware and cyber weapons
Intrusion detection and visualisation
Defense in depth
Monitoring and real time supervision
Applied cryptography
Perimeter security
Safety-security interactions
Cyber security engineering
Secure communication protocols
Formal models for ICS security
Anonymity

ICS Hardware Security

Resilient Systems
Application Security
Secure Firmware

ICS Response and Forensics

Forensics in ICS
Incident Response
Accountability
Digital Laws

Case Studies

The use cases of interests are broad, ranging from the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

The above topic list is not meant to be exhaustive. However, papers without a clear application to ICS security will be considered out of scope and may be rejected without full review.

SUBMISSION GUIDELINES:

Papers should be at most XX pages (using 11-point font), excluding the bibliography and well-marked appendices. Accepted papers should be presented at the Workshop. At least one author of each accepted paper must register to the workshop, by the early date indicated by the organizers, and present the paper. Authors must submit their papers by the deadline indicated below, using the EasyChair web site (use the link : https://easychair.org/conferences/?conf=cyberics2015).


PUBLICATION:

Proceedings are planned to be published by Springer in the Lecture Notes in Computer Science (LNCS) series in conjunction with the DPM and QASA workshops. The submitted paper (in PDF format) should follow the template indicated by Springer (see
http://www.springer.de/comp/lncs/authors.html).

IMPORTANT DATES:

* Submission deadline: July 5th
* Notification to authors: July 31st
* Camera-ready versions: August 7th
* Workshop dates: September 21-22, 2015


COMMITTEE:

* General Chair:
- Adrien Bécue (Airbus Defence & Space)

* Program Committee chairs :
- Nora Cuppens-Boulahia (Télécom Bretagne)
- Frédéric Cuppens (Télécom Bretagne)

* Program Committee:

- Adrien Bécue (Airbus DS CyberSecurity, France)
- Ari Takanen (Codenomicon, Finland)
- David Espes (University of Brest, France)
- Ernesto Damiani (University of Milan, Italy)
- Frédéric Cuppens (IMT-Telecom Bretagne, France)
- Jean Leneutre (Telecom ParisTech, France)
- Joaquin Garcia-Alfaro (Telecom SudParis, France)
- Jozef Vyskoc (VaF, Slovakia)
- Mauro Conti (University of Padua, Italy)
- Michele Bezzi (Sap, France)
- Mourad Debbabi (Concordia University, Canada)
- Nora Cuppens-Boulahia (IMT-Telecom Bretagne; France)
- Radu State (University of Luxembourg, Luxembourg)
- Reda Yaich (IMT-Telecom Bretagne, France)
- Safaa Hachana (IMT-Telecom Bretagne, France)
- Yves Roudier (EURECOM, France)

* Publicity Chair:
- Reda Yaich (IMT-Telecom Bretagne, France)

CONTACTS:

For any enquiries on Cyber ICS 2015, please send an email to : cyberics2015@easychair.org

Related Resources

EI CAECT 2018   2018 International Conference on Aerospace Engineering and Control Technologies(CAECT 2018)
CODASPY 2018   Conference on Data and Application Security and Privacy
SIES 2018   13th IEEE International Symposium on Industrial Embedded Systems
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IEEE - ICMSC - Ei 2018   IEEE-ICMSC 2018-International Conference on Mechanical, System and Control Engineering--Ei Compendex & Scopus
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
AIACT 2018   2018 2nd International Conference on Artificial Intelligence, Automation and Control Technologies (AIACT 2018)
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICMMR--SCOPUS, Ei Compendex 2018   2018 5th International Conference on Mechanics and Mechatronics Research (ICMMR 2018)--EI Compendex, Scopus
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security