posted by organizer: cristinaAcarazTello || 8067 views || tracked by 7 users: [display]

CRITIS 2014 : 9th International Conference on Critical Information Infrastructures Security

FacebookTwitterLinkedInGoogle


Conference Series : Critical Information Infrastructures Security
 
Link: http://critis2014.org
 
When Oct 13, 2014 - Oct 15, 2014
Where Limassol, Cyprus
Submission Deadline Apr 2, 2014
Notification Due Jun 1, 2014
Final Version Due Jun 25, 2014
Categories    critical information infrastru   scada security   smart grid security   security
 

Call For Papers

Modern society relies on the availability and smooth operation of a variety of complex engineering systems. These systems are termed Critical Infrastructure Systems (CIS). Some of the most prominent examples of critical infrastructure systems are electric power systems, telecommunication networks, water distribution systems, transportation systems, wastewater and sanitation systems, financial and banking systems, food production and distribution, and oil/natural gas pipelines. Our everyday life and well-being depend heavily on the reliable operation and efficient management of these critical infrastructures. The citizens expect that critical infrastructure systems will always be available and that, at the same time, they will be managed efficiently (i.e., they will have a low cost). Experience has shown that this is most often true. Nevertheless, critical infrastructure systems fail occasionally. Their failure may be due to natural disasters (e.g., earthquakes and floods), accidental failures (e.g., equipment failures, software bugs, and human errors), or malicious attacks (either direct or remote). When critical infrastructures fail, the consequences are tremendous. These consequences may be classified into societal, health, and economic.

On behalf of the Steering Committee and the Local Organizing Committee we invite you to submit papers and attend the CRITIS 2014 conference. CRITIS 2014 continues a well-established tradition of successful annual conferences. It aims at bringing together researchers and professionals from academia, industry and governmental organisations working in the field of the security of critical infrastructure systems.

Conference web site

http://critis2014.org

Important dates

Deadline for invited session proposals: March 26, 2014
Deadline for submission of papers: April 2, 2014
Notification to authors: June 1, 2014
Camera-ready papers: June 25, 2014

Venue

Limassol, Cyprus

Submission

Further details for submission procedures will be announced in the updated call for papers in early January 2014.

Topics

• Infrastructure resilience and survivability
• Security and protection of complex cyber-physical systems
• Self-healing, self-protection, and self-management architectures
• Cyber security in critical infrastructure systems
• Critical (information-based) infrastructures exercises and contingency plans
• Advanced forensic methodologies for critical information infrastructures
• Economics, investments and incentives of critical infrastructure protection
• Infrastructure dependencies: modeling, simulation, analysis and validation
• Critical infrastructure network and organizational vulnerability analysis
• Critical infrastructure threat and attack modelling
• Public-private partnership for critical infrastructure resilience
• Critical infrastructure protection polices at national and cross-border levels
• Fault diagnosis for critical infrastructures
• Fault tolerant control for critical infrastructures
• Security and protection of smart buildings
• Detection and management of incidents/attacks on critical infrastructures
• Preparedness, prevention, mitigation and planning

Call for Special Sessions

Proposals for organizing special sessions during CRITIS 2014 are cordially invited. Special sessions will comprise 4-6 papers presenting a unifying theme of interest to the conference attendees from a diversity of viewpoints. Special Session proposals from active research projects are particularly welcomed. Proposals for special sessions must include the title of the session, a paragraph describing the theme of the session, names and affiliation of the contributing authors, and tentative titles of the contributions.

The component papers must be submitted separately, by the respective authors, as per the regular submission procedure. Each paper in a proposed invited session will be individually reviewed. Any rejected papers submitted as part of an invited session will be removed and appropriate contributed papers may be substituted, at the discretion of the Program Committee. Likewise, selected papers from rejected invited sessions may be placed into other sessions. Further exchanges may be made to ensure coherence of the sessions, at the discretion of the Program Committee.

Organizing Committee

Marios Polycarpou (University of Cyprus, General Co-Chair)
Elias Kyriakides (University of Cyprus, General Co-Chair)
Christos Panayiotou (University of Cyprus, Program Chair)
Vicenç Puig (Universitat Politècnica de Catalunya, Program Co-Chair)
Erich Rome (Fraunhofer Institute for Intelligent Analysis and Information Systems, Program Co-Chair)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SEAS 2025   14th International Conference on Software Engineering and Applications
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE DAPPS 2025   The 7th IEEE International Conference on Decentralized Applications and Infrastructures