posted by organizer: rjrodriguez || 8163 views || tracked by 9 users: [display]

IJCCBS-SI 2016 : Int. J. of Critical Computer-Based Systems. Special Issue on: Methods and Tools for Assurance of Critical Infrastructure Protection

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
 
When N/A
Where N/A
Submission Deadline Oct 15, 2016
Notification Due Dec 31, 2016
Final Version Due May 15, 2017
Categories    computer science   security   safety   formal methods
 

Call For Papers

.:[ CALL FOR PAPERS ]:.

Int. J. of Critical Computer-Based Systems. Special Issue on: "Methods and Tools for Assurance of Critical Infrastructure Protection"

URL: http://www.inderscience.com/info/ingeneral/cfp.php?id=3464
################

# Guest Editors:
Dr. Stefano Marrone, Second University of Naples, Italy
Dr. Ricardo J. Rodríguez, University of Zaragoza, Spain

Modern society relies on large, heterogeneous, and complex software intensive systems to support all kinds of daily activities. Services such as urban transportation, logistics, healthcare, data communication, railway, aerospace, and power distribution, among others, are becoming heavily dependent on the availability of such infrastructures. Any discontinuity of service may lead to serious problems, from severe financial losses to fatalities or injuries. Discontinuity causes may have different natures, from human error or unexpected acts of nature to intentional attacks like sabotage or terrorism. Safety and security (S&S) assessments in critical infrastructures measure how these disruptions are handled and quantify the impact suffered by the critical infrastructure under abnormal operation. These assessments are normally performed using analytical or simulation based techniques often addressing one single specific aspect at a time rather than studying these infrastructures in a holistic manner.

This special issue aims at bringing together contributions by scientists and practitioners to shed light on the advancements on assurance methods and techniques for critical infrastructure protection. We invite investigators to contribute original research articles as well as review articles that assemble visions, ideas, experiences, and research advancement in this area.

The issue will carry revised and substantially extended versions of selected papers presented at the 1st International Workshop on Safety & Security aSSurance for Critical Infrastructures Protection (S4CIP 2016) , but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

# Subject Coverage

Suitable topics include, but are not limited, to the following:

* Methods and methodologies: threat, vulnerability and risk assessment; model based penetration testing; security metrics definition and evaluation; RAMSS analysis; crisis and emergency management; unifying modelling methodologies for cyber and physical security; resilience engineering.
* Modelling: stochastic modelling; formal methods; domain specific languages and model driven engineering; multi level hierarchical modelling; multi paradigm modelling.
* Analysis: quantitative and qualitative evaluation; interconnections among non-functional aspects (e.g. reliability vs. Safety, Security vs. Performance); multi-solution processes; resilience analysis
* Domains: cyber physical systems; critical infrastructure protection; SCADA and control systems security; homeland security; transportation, manufacturing, energy, health and banking applications; computer networks and cloud infrastructures.

# Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper was not originally copyrighted and if it has been completely re-written).

All papers are refereed through a **double blind** process. No author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Contact the Guest Editors if you have any questions. Papers that are not properly anonymized may be rejected without review.

All papers must be submitted online.

# Important Dates

Submission of manuscripts: 15 October, 2016
Notification to authors: 31 December, 2016
Revised paper: 15 March, 2017
Final Decision: 15 April, 2017
Final versions due: 15 May, 2017

Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
ACMC 2017   Australasian Computer Music Conference
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
IEEE Trans SUSC 2019   IEEE Trans on Sustainable Computing (SI: Intersection of Computing and Communication Technologies with Energy Systems)
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
IEEE AVSS 2018   IEEE International Conference on Advanced Video and Signal-based Surveillance
ICS 2018   the 32nd ACM International Conference on Supercomputing
SSSCC 2018   Smart, Sustainable and Safe Cities Conference
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems