posted by organizer: rjrodriguez || 9995 views || tracked by 9 users: [display]

IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructure Protection

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
 
When N/A
Where N/A
Submission Deadline Oct 15, 2016
Notification Due Dec 31, 2016
Final Version Due May 15, 2017
Categories    computer science   security   safety   formal methods
 

Call For Papers

.:[ CALL FOR PAPERS ]:.

Int. J. of Critical Computer-Based Systems. Special Issue on: "Methods and Tools for Assurance of Critical Infrastructure Protection"

URL: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
################

# Guest Editors:
Dr. Stefano Marrone, Second University of Naples, Italy
Dr. Ricardo J. Rodríguez, University of Zaragoza, Spain

Modern society relies on large, heterogeneous, and complex software intensive systems to support all kinds of daily activities. Services such as urban transportation, logistics, healthcare, data communication, railway, aerospace, and power distribution, among others, are becoming heavily dependent on the availability of such infrastructures. Any discontinuity of service may lead to serious problems, from severe financial losses to fatalities or injuries. Discontinuity causes may have different natures, from human error or unexpected acts of nature to intentional attacks like sabotage or terrorism. Safety and security (S&S) assessments in critical infrastructures measure how these disruptions are handled and quantify the impact suffered by the critical infrastructure under abnormal operation. These assessments are normally performed using analytical or simulation based techniques often addressing one single specific aspect at a time rather than studying these infrastructures in a holistic manner.

This special issue aims at bringing together contributions by scientists and practitioners to shed light on the advancements on assurance methods and techniques for critical infrastructure protection. We invite investigators to contribute original research articles as well as review articles that assemble visions, ideas, experiences, and research advancement in this area.

The issue will carry revised and substantially extended versions of selected papers presented at the 1st International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (S4CIP 2016) , but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

# Subject Coverage

Suitable topics include, but are not limited, to the following:

* Methods and methodologies: threat, vulnerability and risk assessment; model based penetration testing; security metrics definition and evaluation; RAMSS analysis; crisis and emergency management; unifying modelling methodologies for cyber and physical security; resilience engineering.
* Modelling: stochastic modelling; formal methods; domain specific languages and model driven engineering; multi level hierarchical modelling; multi paradigm modelling.
* Analysis: quantitative and qualitative evaluation; interconnections among non-functional aspects (e.g. reliability vs. Safety, Security vs. Performance); multi-solution processes; resilience analysis
* Domains: cyber physical systems; critical infrastructure protection; SCADA and control systems security; homeland security; transportation, manufacturing, energy, health and banking applications; computer networks and cloud infrastructures.

# Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a **double blind** process. No author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the Guest Editors if you have any questions. Papers that are not properly anonymized may be rejected without review.

All papers must be submitted online.

# Important Dates

Submission of manuscripts: 15 October, 2016
Notification to authors: 31 December, 2016
Revised paper: 15 March, 2017
Final Decision: 15 April, 2017
Final versions due: 15 May, 2017

Related Resources

ICDM 2020   20th IEEE International Conference on Data Mining
AVC 2020   Advances in Vision Computing: An International Journal
CASM_SI_5GIoT 2020   CASM Special Issue on Emerging Technologies in 5G-Based IoT
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CCVPR 2020   2020 3rd International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2020)
IEEE-CVIV 2020   2020 2nd International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2020)
FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
ACM--NLPIR--Ei Compendex and Scopus 2020   ACM--2020 4th International Conference on Natural Language Processing and Information Retrieval (NLPIR 2020)--Scopus, Ei Compendex
GreeNet Symposium - SGNC 2020   11th Symposium on Green Networking and Computing (SGNC 2020)
ACM--ICCCR--Ei Compendex, Scopus 2021   ACM--2021 International Conference on Computer, Control and Robotics (ICCCR 2021)--Ei Compendex, Scopus