ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SPTCP 2014 - Symposium on Security, Privacy and Trust for Cyber-Physical Systems

Date2014-04-21 - 2014-04-24

Deadline2013-11-24

VenueSingapore, Singapore Singapore

Keywords

Websitehttp://issnip2014.i2r.a-star.edu.sg/symposium.php

Topics/Call fo Papers

Pervasive sensing, information and communication technologies are penetrating a wide range of industries and critical infrastructures at an unprecedented scale. Through high-speed communication networks, a large number of sensors provide up-to-date information to industrial control systems and processing centers that perform data mining of large volumes of data (Big Data). Industrial control systems were traditionally not connected to corporate networks and not designed to have security countermeasures, so when these new connections are made, security problems arise. Furthermore, when the data involves the privacy of individuals, such as smart meter data and surveillance video, data mining systems should take care not to reveal this privacy-sensitive information to unauthorized outsiders.
Topics of Interest
This Symposium invites all submissions on topics including but not limited to the following:
cryptographic schemes, access control, intrusion detection and response systems for cyber-physical systems
cyber security of industrial control systems, including general SCADA systems and smart grid control systems
security of communication networks and network protocols in cyber-physical systems
security issues of wireless sensor networks and cloud computing in the cyber-physical context
trusted computing and resilient architectures for cyber-physical systems
formal verification of security protocols
detection of insider attacks
protection of the integrity of sensor-supplied data
assessment of the impact of maliciously injected false data and communication-oriented DoS attacks on control systems
design and analysis of resilient control systems
risk analysis and detection of intrusion of cyber-physical systems
privacy preservation in data mining

Last modified: 2013-09-11 21:57:02