ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CSCIP 2017 - International Workshop on Challenges and Solutions for Critical Infrastructure Protection (CSCIP-2017)

Date2017-06-21 - 2017-06-23

Deadline2017-03-15

VenueExeter, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://www.fitnesslab.altervista.org/in...

Topics/Call fo Papers

Traditional Critical Infrastructures (CIs) were intrinsically secure systems, due to a combination of factors, and in particular: 1) their operation was based (almost exclusively) on special purpose devices, using proprietary technologies; 2) they were closed systems composed of individual and isolated components; 3) they were largely based on dedicated (as opposed to shared) communication networks; and 4) they massively relied on proprietary software and communication protocols. In the last few years rapid changes in technologies and their use contributed to set up a new scene where CIs are monitored by Supervisory Control And Data Acquisition (SCADA) systems that are largely made of Commercial-Off-The-Shelf (COTS) components and subsystems being connected using standard communication protocols and through the infrastructure of the corporate Local Area Network (LAN), or even Wide Area Network (WAN) links, possibly including the public Internet, as well as wireless/satellite trunks. This technology shift brought many positive effects, such as the availability of a large base of standard and well-known protocols, the possibility of using shared and interconnected networks to support distributed SCADA systems, and the deployment of IP-based services and applications on top of SCADA systems. The other side of the coin is that current CIs are exposed to major security risks. Evidence is showing that coordinated and targeted cyber-attacks on Critical Infrastructures are increasing and becoming more sophisticated. It is worth emphasizing that we are witnessing a dramatic increase of external borne security incidents, while internal are basically stable, and accidental have increased only slightly (most probably, such a slight increase is mainly due to the increased complexity of the equipment, which results in more operator mistakes and interactions faults in general).
We invite researchers and practitioners from the academia, industry, and Public Administration to contribute original research articles that will stimulate the continuing efforts to cope with the ever increasing complexity of Critical Infrastructure Protection.
We are interested in articles describing how problems have been solved and/or discussing, which challenges will become critical in the next years. We particularly welcome contributions related to real world scenarios.
Workshop topics:
Potential topics include, but are not limited to:
Real-time security and dependability monitoring;
Secure high-speed communication networks;
Stream processing solutions for SCADA system security;
Flexible and scalable techniques for policy management;
Cyber-physical systems security;
Hardware security building blocks;
Data mining tools and techniques;
Trusted Computing for deeply embedded platforms;
Simulation of cyber-physical systems;
Novel visualization solutions for cyber-physical systems;
Human factor aspects.

Last modified: 2017-02-19 13:37:12