ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ICS-CSR 2017 - 5th International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

Date2017-10-18 - 2017-10-20

Deadline2017-07-14

VenueUniversity of South Alabama, USA - United States USA - United States

Keywords

Websitehttps://www.ics-csr.com

Topics/Call fo Papers

5th International Symposium for
Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
www.ics-csr.com
18 - 20 October 2017
University of South Alabama (USA)
Alabama, USA
*Deadline: Friday 14th July 2017 (23:59 CET)*
The 5th International Symposium for ICS & SCADA Cyber Security brings
together researchers with an interest in the security of industrial
control systems in the light of their increasing exposure to
cyber-space. The topics of interests are broad, ranging from security
for hardware/firmware used in industrial control systems, to system
aspects of ICS such as secure architectures and vulnerability
screening to the human aspects of cyber security such as behaviour
modelling and training. ICS-CSR is a research conference aimed at high
quality academic research in any of the specified themes and topics of
interest. We welcome original contributions that present innovative
ideas, proof of concepts, use cases, and results from a variety of
domains with a wish to enhance the security of infrastructure.
Proceedings of the ICS-CSR are hosted by the British Computer Society
(BCS) in their eWiC series. Proceedings are indexed in the ACM Digital
Library, EBSCO, DBPL and Google Scholar.
This year's conference will take place on the 18th to 20th of October
2017 at the University of South Alabama, USA.
As with last year's edition, we will be inviting the best conference
submissions to a special issue in EAI Transactions on Security and
Safety. Papers will have to be significantly extended and will
undergo an additional peer-review process before acceptance. The call
for extended papers will be distributed at the conference.
Important Dates (All deadlines are 23:59 CET)
Paper Submission due: 14 July 2017
Acceptance notification: 14 August 2017
Revised papers due: 21 August 2017
Research Themes & Topics of Interest:
ICS-CSR is welcoming contributions that have a direct application or
relevance to Security aspects of Distributed Control Systems (DCS),
Supervisory Control and Data Acquisition Systems (SCADA), Industrial
Control Systems (ICS), Cyber Physical Systems (CPS), Industrial
Internet of Things (IIoT), Smart City, or Industry 4.0.
This topic list is not meant to be exhaustive; ICS-CSR is interested
in all aspects of computer security relating to the above
themes. Papers without a clear application to SCADA, Embedded Systems
or Industrial Control, however, will be considered out of scope and
may be rejected without full review.
Main Conference Themes:
Hardware Security Solutions
- Encryption, Authentication, Availability Assurance
- Resilient Systems
- Application security
- Secure Firmware
- Communication Systems
- Timing Vulnerabilities in RT-Control Systems
- Security Implications of Feature Interactions
System Security
- Security architectures
- Safety-Security Interactions
- Intrusion detection
- Security Monitoring
- Malware Analysis
- Cyber Security Engineering
- Vulnerability Assessment/Screening
- Secure Communication Protocols
- Metrics
- Anonymity
- Language-based security
- Network security
- Patching and Maintenance
Digital Forensics and Response
- Hardware Forensics
- Incidence Response
- Live Forensics
- Accountability
- Forensic Readiness
Security Management
- Risk Management
- Security Metrics
- Governance and Policy
- Business Continuity
- Critical Infrastructure Protection
Human Factors Security
- Awareness & Training
- Behavioural Modelling
- Threat Profiling
Special Session on Cyber Security of ICS for Smart Grid:
- Securing legacy industrial control systems in a modern smart
grid
- Smart grid ICS threat analysis and modelling
- Cyber security risk management for smart grid
- Cyber-attack resilience and tolerance analysis
- Control strategies for the recovery of the smart grid under
cyber attack
- Smart grid security analytics and intrusion detection
- Secure state estimation
- Cyber security for microgrids
- Cyber security for electrical substation automation
- Data security technologies for smart meters
Special Session on Cyber Security and Situational Awareness:
- Information exchange for cyber situational awareness
- Human-computer interaction, work flows and visualization for
cyber situational awareness
- Training and exercises for cyber situational awareness
- Bridging the gap between the operational/technical and
strategic/management levels
- Deception and cyber situational awareness
- Empirical evaluations of technical solutions for cyber
situational awareness
- Uncertainty, strategic behavior and game theory related to
cyber situational awareness
- Data fusion for cyber situational awareness
Instructions for Paper Submission
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers must be clearly presented in
English, must not exceed 10 pages, including tables, figures,
references and appendixes and follow the EWIC formatting
guidelines:http://ewic.bcs.org/category/15364. Accepted papers will
be published
in conference proceedings and indexed in the ACM digital library, DBLP
amongst others.
All papers will be peer reviewed by members of the Programme
Committee. Papers will be selected based on originality, timeliness,
significance, relevance, and clarity of presentation. Distinguished
papers, after further revisions, will be considered for publication in
a special issue. The program committee will select a Best Paper Award
winner for this conference. Submission of a paper should be regarded
as a commitment that, should the paper be accepted, at least one of
the authors will register and attend the conference to present the
work.
Submit your paper via EasyChair:
https://www.easychair.org/conferences/?conf=icscsr...
Instructions for Short/Positional Paper Submission
We welcome the submission of short positional papers for short
presentation or poster presentation during the conference. Positional
papers must be clearly presented in English, must not exceed 4 pages,
including tables, figures, references and appendixes and follow the
EWIC formatting guidelines: http://ewic.bcs.org/category/15364.
Accepted papers will be eligible for inclusion for presentation as a
poster during the conference and selected papers will be included as
an annex in the published conference proceedings.
Submit your short positional paper via EasyChair:
https://www.easychair.org/conferences/?conf=icscsr...
and use the prefix "POSITIONAL:" in the registration title.
Program Committee
General Conference Chairs:
* Kevin Jones, Airbus, UK
kevin.jones-AT-ics-csr.com
* Helge Janicke, De Montfort University, UK
helge.janicke-AT-ics-csr.com
* Thomas Brandstetter, Fachhochschule St. Pölten, Austria
thomas.brandstetter-AT-ics-csr.com
Local Organising Chairs
* Alec Yasinsac, University of South Alabama
yasinsac-AT-southalabama.edu
* Michael Chambers, University of South Alabama
michaelchambers-AT-southalabama.edu
Organising Commitee
* Web Chair: Robert Luh (University of Applied Sciences St. Polten)
* Publication Chairs: Leandros Maglaras (De Montfort Universtiy),
Mohamed Amine Ferrag (Guelma University)
* Workshop Chair: Adam Wedgbury (Airbus)
Special Session Chairs
* Ulrik Franke (SICS, Swedish Institute of Computer Science)
* Paul Smith (AIT, Austria)
* Kieran McLaughlin (Queen's University Belfast, UK)
Technical Program Committee Members (TBC):
- Adriano Valenzano, CNR-IEIIT, National Research Council of Italy
- Alvaro Cárdenas, University of Texas at Dallas, USA
- André Teixeira, TU Delft, Netherlands
- Andrew Jones, De Montfort University, UK
- Andrew Nicholson, East Midlands Police, UK
- Antoine Lemay, Ecole Polytechnique de Montreal, Canada
- Ayman Al Issa, Booz Allen Hamilton, Abu Dhabi
- Babak Akhgar, Sheffield Hallam University, UK
- Béla Genge, Petru Maior University of Tg. Mures
- Chris Hankin, Imperial College UK
- Chris Johnson, University of Glasgow UK
- Christian Facchi, Technische Hochschule Ingolstadt, DE
- Cody Fleming, University of Virginia, USA
- David Hutchison, Lancaster University UK
- David Laverty, Queen's University Belfast, UK
- Edmundo Monteiro, University of Coimbra Portugal
- Eireann Leverett, University of Cambridge, UK
- Eric Byres, Byres Security
- Erol Gelenbe, Imperial College UK
- Federico Maggi Politecnico di Milano Italy
- Florian Skopik, AIT Austrian Institute of Technology
- Frank Fransen, TNO, Netherlands
- Giampaolo Bella, Università di Catania, Italy
- Göran N. Ericsson, SvK Swedish National Grid and KTH Royal
Institute of Technology
- Helmut Kaufmann, Airbus Group Innovations, Germany
- Henrik Sandberg, KTH Royal Institute of Technology, Sweden
- Howard Shrobe, Massachusetts Institute of Technology (MIT), USA
- Jens Braband, Siemens, Germany
- Joel Brynielsson, FOI Swedish Defence Research Agency, Sweden
- John Baras University of Maryland USA
- John O'Raw, Letterkenny Institute of Technology, Ireland
- Jose Fernandez Ecole Polytechnique de Montreal Canada
- Jens Tölle, Fraunhofer-FKIE, Germany
- Jules Ferdinand Pagna Disso, Nettitude UK
- Kieran McLaughlin, Queen's University Belfast NI
- Laurens Lemaire KU Leuven Belgium
- Luca Durante, CNR-IEIIT Italy
- Lucie Langer, AIT Austrian Institute of Technology, Austria
- Leandros Maglaras, De Montfort University, UK
- Margaret Varga, Oxford University, UK
- Marina Krotofil, European Network for Cyber Security, Netherlands
- Mark Carolan, Esoion Group, Ireland
- Martin Hutle, Fraunhofer AISEC, Germany
- Mathias Fischer, University of Münster, Germany
- Michal Choras, University of Technology and Life Sciences (UTP),
Poland
- Michael Kasper, Fraunhofer Institute SIT Germany
- Michael Roßberg, Technische Universität Ilmenau Germany
- Monica Whitty, University of Leicester UK
- Nancy Leveson, Massachusetts Institute of Technology, USA
- Nikolai Stoianov, Defence Institute, Bulgaria
- Oscar Garcea-Morchon, Philips Research Netherlands
- Paddy Francis, Airbus Defence and Space UK
- Panayotis Kikiras, AGT International
- Paul Smith, AIT Austrian Institute of Technology GmbH Austria
- Paulo Simões, University of Coimbra Portugal
- Pete Burnap, Cardiff University UK
- Peter Fuhr Oak Ridge National Laboratory USA
- Piroska Haller, Petru Maior University of Tg. Mures, Romania
- Robert Oates, Rolls-Royce PLC UK
- Rob Rowlingson, BT Security UK
- Roman Schlegel, ABB Corporate Research, Switzerland
- Sebastian Obermeier, ABB Corporate Research, Switzerland
- Stephan Reiff-Marganiec, University of Leicester UK
- Stephen Wolthusen Royal Holloway, University of London,
and Norwegian University of Science and Technology (NTNU) Norway
- Thomas Brandstetter, Limes Security and FH St Poelten, Austria
- Thomas H. (Tommy) Morris, Mississippi State University USA
- Tiago Cruz, University of Coimbra, Portugal
- Tobias Gebhardt, Airbus Defence and Space Cyber Security
- Ulrik Franke, SICS – Swedish Institute of Computer Science
- William Knowles, Lancaster University UK
- Rohan Chabukswar, United Technologies Research Center, Ireland
- Silvio La Porta, EMC, Ireland
- Yi Yang, State Grid Jiangsu Electric Power Company Research
Institute, China

Last modified: 2017-06-08 23:37:17