posted by user: flamminifra || 6985 views || tracked by 7 users: [display]

CIS-BOOK 2011 : Book: CRITICAL INFRASTRUCTURE SECURITY: Assessment, Prevention, Detection, Response (WIT Press)

FacebookTwitterLinkedInGoogle

Link: http://www.witpress.com/978-1-84564-562-5.html
 
When Jan 1, 2010 - Dec 31, 2011
Where WIT PRESS BOOK
Abstract Registration Due Mar 1, 2010
Submission Deadline Jun 1, 2010
Notification Due Aug 15, 2010
Final Version Due Oct 1, 2010
Categories    critical infrastructures   homeland security   smart surveillance, protection   modeling & simulation
 

Call For Papers

*** UPDATED MARCH 6TH 2012 ***

BOOK PUBLISHED. SEE:

http://www.witpress.com/978-1-84564-562-5.html


*** PROVISIONAL CFP - Please check for updates frequently ***

Important Notice:
If you have planned to contribute, please register and submit a provisional title/draft-abstract of your chapter as soon as you can (possibly by the early deadline of *** 1st February 2010 ***). This will give the editor the possibility of adapting the table of content to the main topics of your contributions, and your paper will have more chances to be included in the book. This only serves for organizational purposes: your abstract will be ealuated only after the official deadline.


BOOK TITLE: CRITICAL INFRASTRUCTURE SECURITY
SUBTITLE: Assessment, Prevention, Detection, Response.

TO BE PUBLISHED BY: WIT Press (Wessex Institute of Technology, http://www.witpress.com)

EDITOR: Dr. Francesco Flammini

EXPECTED NUMBER OF PAGES: about 320

SHORT DESCRIPTION:
The book surveys state-of-the-art methodologies and tools in the following areas which are relevant to the fields of Critical Infrastructure Protection and Homeland Security:
− Threat and vulnerability analysis, risk assessment, modeling and simulation
− Protection mechanisms, including smart sensors and intelligent detectors
− Early warning, decision support and emergency management systems
Each area will be addressed considering both theoretical aspects and practical applications.

CALL FOR PAPERS:
Well-written and self-contained papers in any area included in book coverage are welcome. Each paper will constitute a chapter and should be about 20 pages long. Please refer to the table of contents reported below to better focus the aim of your contribution. For each part of the book, at least one review paper is welcome. Papers providing original results of an already mature research area are preferred. On-going research descriptions or introductive interdisciplinary articles can be considered for publication as well, provided that they fit the main topics of the book and they have not been published before nor they are being considered for publication elsewhere. Papers will be peer reviewed by known experts in the specific fields.

TABLE OF CONTENTS (TENTATIVE):

Part I: Risk Analysis for Critical Infrastructures − about 4 chapters
Qualitative and Quantitative Methods for Risk Management (Risk Assessment, Risk Mitigation). Model-based approaches. Usage of graphical formalisms for threat and consequence modeling (Attack Trees, Event Trees, Bayesian Networks, etc.). Statistical approaches. Uncertainty modeling.

Part II: Critical Infrastructure Modeling & Simulation − about 4 chapters
Homeland security issues (background and norms). Analytical and simulation-based techniques for failure and interdependence modeling. Intra and inter infrastructure models. Multi-paradigm approaches. Social and organizational aspects. Case-studies and applications to most important infrastructures.

Part III: Protection Mechanisms for Critical Infrastructures − about 4 chapters
Design and evaluation of innovative detectors for physical protection. Passive and active devices. Smart wireless sensors. Intelligent video and audio analytics. Intrusion Detection and Access Control. Biometric Identification. Logical / Cyber security (information systems, SCADA, computer networks).

Part IV: Early Warning and Decision Support Systems − about 4 chapters
Security management software. Advanced situational awareness tools for event correlation. Hierarchical model-based or agent-based systems for the detection of anomalies. Distributed monitoring. Data integration and fusion. Intelligent sensor networks. Soft computing approaches. Workflow-based emergency planning.

Related Resources

CPS4CIP 2024   The 5th International Workshop on Cyber-Physical Security for Critical Infrastructures Protection (CPS4CIP 2024)
ACM BSCI 2024   The 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure
CIPHERSS 2024   1st Workshop on Critical Infrastructure PHysical-cybER Safety and Security
CIS 2024   5th Congress on Intelligent Systems
ICCS Workshop 2024   Ninth Annual Industrial Control System Security (ICSS) Workshop
Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”
HAICTW 2025   Human-AI Collaboration Transforming Workforces with Gen AI
Critical Thinking and the Middle Ages 2025   'Doctor Virtualis. Journal of History of Medieval Philosophy' n. 20 - Critical Thinking and the Middle Ages