posted by organizer: rjrodriguez || 5381 views || tracked by 4 users: [display]

IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructure Protection

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
 
When N/A
Where N/A
Submission Deadline Oct 15, 2016
Notification Due Dec 31, 2016
Final Version Due May 15, 2017
Categories    computer science   security   safety   formal methods
 

Call For Papers

.:[ CALL FOR PAPERS ]:.

Int. J. of Critical Computer-Based Systems. Special Issue on: "Methods and Tools for Assurance of Critical Infrastructure Protection"

URL: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
################

# Guest Editors:
Dr. Stefano Marrone, Second University of Naples, Italy
Dr. Ricardo J. Rodríguez, University of Zaragoza, Spain

Modern society relies on large, heterogeneous, and complex software intensive systems to support all kinds of daily activities. Services such as urban transportation, logistics, healthcare, data communication, railway, aerospace, and power distribution, among others, are becoming heavily dependent on the availability of such infrastructures. Any discontinuity of service may lead to serious problems, from severe financial losses to fatalities or injuries. Discontinuity causes may have different natures, from human error or unexpected acts of nature to intentional attacks like sabotage or terrorism. Safety and security (S&S) assessments in critical infrastructures measure how these disruptions are handled and quantify the impact suffered by the critical infrastructure under abnormal operation. These assessments are normally performed using analytical or simulation based techniques often addressing one single specific aspect at a time rather than studying these infrastructures in a holistic manner.

This special issue aims at bringing together contributions by scientists and practitioners to shed light on the advancements on assurance methods and techniques for critical infrastructure protection. We invite investigators to contribute original research articles as well as review articles that assemble visions, ideas, experiences, and research advancement in this area.

The issue will carry revised and substantially extended versions of selected papers presented at the 1st International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (S4CIP 2016) , but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

# Subject Coverage

Suitable topics include, but are not limited, to the following:

* Methods and methodologies: threat, vulnerability and risk assessment; model based penetration testing; security metrics definition and evaluation; RAMSS analysis; crisis and emergency management; unifying modelling methodologies for cyber and physical security; resilience engineering.
* Modelling: stochastic modelling; formal methods; domain specific languages and model driven engineering; multi level hierarchical modelling; multi paradigm modelling.
* Analysis: quantitative and qualitative evaluation; interconnections among non-functional aspects (e.g. reliability vs. Safety, Security vs. Performance); multi-solution processes; resilience analysis
* Domains: cyber physical systems; critical infrastructure protection; SCADA and control systems security; homeland security; transportation, manufacturing, energy, health and banking applications; computer networks and cloud infrastructures.

# Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a **double blind** process. No author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the Guest Editors if you have any questions. Papers that are not properly anonymized may be rejected without review.

All papers must be submitted online.

# Important Dates

Submission of manuscripts: 15 October, 2016
Notification to authors: 31 December, 2016
Revised paper: 15 March, 2017
Final Decision: 15 April, 2017
Final versions due: 15 May, 2017

Related Resources

ICML 2017   34rd International Conference on Machine Learning
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
IJE 2016   International Journal of Education
ICCV 2017   International Conference on Computer Vision
PAAMS 2017   15th International Conference on Practical Applications of Agents and Multi-Agent Systems
IEEE ICECCT 2017   2017 IEEE International Conference on Electrical, Computer and Communication Technologies
WSCG 2017   WSCG - 25. Conference on Computer Graphics, Visualization and Computer Vision
ISMIS 2017   23rd International Symposium on Methodologies for Intelligent Systems
iThings 2016   The 9th IEEE International Conference on Internet of Things
ST: Model-Based Testing 2016   Theme issue on Model-Based Testing : Software and Systems Modeling Journal (SoSyM)