| |||||||||||||||||
CIS-BOOK 2011 : Book: CRITICAL INFRASTRUCTURE SECURITY: Assessment, Prevention, Detection, Response (WIT Press) | |||||||||||||||||
Link: http://www.witpress.com/978-1-84564-562-5.html | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
*** UPDATED MARCH 6TH 2012 ***
BOOK PUBLISHED. SEE: http://www.witpress.com/978-1-84564-562-5.html *** PROVISIONAL CFP - Please check for updates frequently *** Important Notice: If you have planned to contribute, please register and submit a provisional title/draft-abstract of your chapter as soon as you can (possibly by the early deadline of *** 1st February 2010 ***). This will give the editor the possibility of adapting the table of content to the main topics of your contributions, and your paper will have more chances to be included in the book. This only serves for organizational purposes: your abstract will be ealuated only after the official deadline. BOOK TITLE: CRITICAL INFRASTRUCTURE SECURITY SUBTITLE: Assessment, Prevention, Detection, Response. TO BE PUBLISHED BY: WIT Press (Wessex Institute of Technology, http://www.witpress.com) EDITOR: Dr. Francesco Flammini EXPECTED NUMBER OF PAGES: about 320 SHORT DESCRIPTION: The book surveys state-of-the-art methodologies and tools in the following areas which are relevant to the fields of Critical Infrastructure Protection and Homeland Security: − Threat and vulnerability analysis, risk assessment, modeling and simulation − Protection mechanisms, including smart sensors and intelligent detectors − Early warning, decision support and emergency management systems Each area will be addressed considering both theoretical aspects and practical applications. CALL FOR PAPERS: Well-written and self-contained papers in any area included in book coverage are welcome. Each paper will constitute a chapter and should be about 20 pages long. Please refer to the table of contents reported below to better focus the aim of your contribution. For each part of the book, at least one review paper is welcome. Papers providing original results of an already mature research area are preferred. On-going research descriptions or introductive interdisciplinary articles can be considered for publication as well, provided that they fit the main topics of the book and they have not been published before nor they are being considered for publication elsewhere. Papers will be peer reviewed by known experts in the specific fields. TABLE OF CONTENTS (TENTATIVE): Part I: Risk Analysis for Critical Infrastructures − about 4 chapters Qualitative and Quantitative Methods for Risk Management (Risk Assessment, Risk Mitigation). Model-based approaches. Usage of graphical formalisms for threat and consequence modeling (Attack Trees, Event Trees, Bayesian Networks, etc.). Statistical approaches. Uncertainty modeling. Part II: Critical Infrastructure Modeling & Simulation − about 4 chapters Homeland security issues (background and norms). Analytical and simulation-based techniques for failure and interdependence modeling. Intra and inter infrastructure models. Multi-paradigm approaches. Social and organizational aspects. Case-studies and applications to most important infrastructures. Part III: Protection Mechanisms for Critical Infrastructures − about 4 chapters Design and evaluation of innovative detectors for physical protection. Passive and active devices. Smart wireless sensors. Intelligent video and audio analytics. Intrusion Detection and Access Control. Biometric Identification. Logical / Cyber security (information systems, SCADA, computer networks). Part IV: Early Warning and Decision Support Systems − about 4 chapters Security management software. Advanced situational awareness tools for event correlation. Hierarchical model-based or agent-based systems for the detection of anomalies. Distributed monitoring. Data integration and fusion. Intelligent sensor networks. Soft computing approaches. Workflow-based emergency planning. |
|