posted by organizer: rjrodriguez || 10575 views || tracked by 9 users: [display]

IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructure Protection

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
 
When N/A
Where N/A
Submission Deadline Oct 15, 2016
Notification Due Dec 31, 2016
Final Version Due May 15, 2017
Categories    computer science   security   safety   formal methods
 

Call For Papers

.:[ CALL FOR PAPERS ]:.

Int. J. of Critical Computer-Based Systems. Special Issue on: "Methods and Tools for Assurance of Critical Infrastructure Protection"

URL: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
################

# Guest Editors:
Dr. Stefano Marrone, Second University of Naples, Italy
Dr. Ricardo J. Rodríguez, University of Zaragoza, Spain

Modern society relies on large, heterogeneous, and complex software intensive systems to support all kinds of daily activities. Services such as urban transportation, logistics, healthcare, data communication, railway, aerospace, and power distribution, among others, are becoming heavily dependent on the availability of such infrastructures. Any discontinuity of service may lead to serious problems, from severe financial losses to fatalities or injuries. Discontinuity causes may have different natures, from human error or unexpected acts of nature to intentional attacks like sabotage or terrorism. Safety and security (S&S) assessments in critical infrastructures measure how these disruptions are handled and quantify the impact suffered by the critical infrastructure under abnormal operation. These assessments are normally performed using analytical or simulation based techniques often addressing one single specific aspect at a time rather than studying these infrastructures in a holistic manner.

This special issue aims at bringing together contributions by scientists and practitioners to shed light on the advancements on assurance methods and techniques for critical infrastructure protection. We invite investigators to contribute original research articles as well as review articles that assemble visions, ideas, experiences, and research advancement in this area.

The issue will carry revised and substantially extended versions of selected papers presented at the 1st International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (S4CIP 2016) , but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

# Subject Coverage

Suitable topics include, but are not limited, to the following:

* Methods and methodologies: threat, vulnerability and risk assessment; model based penetration testing; security metrics definition and evaluation; RAMSS analysis; crisis and emergency management; unifying modelling methodologies for cyber and physical security; resilience engineering.
* Modelling: stochastic modelling; formal methods; domain specific languages and model driven engineering; multi level hierarchical modelling; multi paradigm modelling.
* Analysis: quantitative and qualitative evaluation; interconnections among non-functional aspects (e.g. reliability vs. Safety, Security vs. Performance); multi-solution processes; resilience analysis
* Domains: cyber physical systems; critical infrastructure protection; SCADA and control systems security; homeland security; transportation, manufacturing, energy, health and banking applications; computer networks and cloud infrastructures.

# Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a **double blind** process. No author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the Guest Editors if you have any questions. Papers that are not properly anonymized may be rejected without review.

All papers must be submitted online.

# Important Dates

Submission of manuscripts: 15 October, 2016
Notification to authors: 31 December, 2016
Revised paper: 15 March, 2017
Final Decision: 15 April, 2017
Final versions due: 15 May, 2017

Related Resources

Federated Learning in IOT Cybersecurity 2021   PeerJ Computer Science - Federated Learning for Cybersecurity in Internet of Things
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
Computer SI on SE4RAI 2023   IEEE Computer - Special Issue on Software Engineering for Responsible AI
RiE 2022   13th International Conference on Robotics in Education
Sensors-SI-ISHMA 2021   [Sensors, IF 3.275] Special Issue on Intelligent Sensors for Human Motion Analysis
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
Sensors 2022   Sustainable Computing based on Internet of Things Empowered with Artificial Intelligence and Blockchain
CONF-CDS 2022   The 4th International Conference on Computing and Data Science (CONF-CDS) Call for Papers
SI in Frontiers in Signal Processing 2022   Deep-Learning Based Image Enhancement and Compression
SI-DAMLE 2022   Special Issue on Data Analytics and Machine Learning in Education