[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]

CFP: 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014)



** Apologies for multiple copies **

C a l l =A0 =A0 F o r =A0 =A0 P a p e r s

CRITIS 2014
9th International Conference on=20
Critical Information Infrastructures Security

October 13-15, 2014
Limassol, Cyprus

http://critis2014.org

Modern society relies on the availability and smooth operation of a variety=
 of complex engineering systems. These systems are termed Critical Infrastr=
ucture Systems (CIS). Some of the most prominent examples of critical infra=
structure systems are electric power systems, telecommunication networks, w=
ater distribution systems, transportation systems, wastewater and sanitatio=
n systems, financial and banking systems, food production and distribution,=
 and oil/natural gas pipelines. Our everyday life and well-being depend hea=
vily on the reliable operation and efficient management of these critical i=
nfrastructures. The citizens expect that critical infrastructure systems wi=
ll always be available and that, at the same time, they will be managed eff=
iciently (i.e., they will have a low cost). Experience has shown that this =
is most often true. Nevertheless, critical infrastructure systems fail occa=
sionally. Their failure may be due to natural disasters (e.g., earthquakes =
and floods), accidental failures (e.g., equipment failures, software bugs, =
and human errors), or malicious attacks (either direct or remote). When cri=
tical infrastructures fail, the consequences are tremendous. These conseque=
nces may be classified into societal, health, and economic.

On behalf of the Steering Committee and the Local Organizing Committee we i=
nvite you to submit papers and attend the CRITIS 2014 conference. CRITIS 20=
14 continues a well-established tradition of successful annual conferences.=
 It aims at bringing together researchers and professionals from academia, =
industry and governmental organizations working in the field of the securit=
y of critical infrastructure systems.=20

Conference web site

http://critis2014.org

Important dates

Deadline for invited session proposals: March 26, 2014
Deadline for submission of papers: April 2, 2014
Notification to authors: June 1, 2014
Camera-ready papers: June 25, 2014

Venue

Limassol, Cyprus

Submission=20

Further details for submission procedures will be announced in the updated =
call for papers in early January 2014.

Topics

=95	Infrastructure resilience and survivability=20
=95	Security and protection of complex cyber-physical systems=20
=95	Self-healing, self-protection, and self-management architectures=20
=95	Cyber security in critical infrastructure systems
=95	Critical (information-based) infrastructures exercises and contingency =
plans
=95	Advanced forensic methodologies for critical information infrastructure=
s
=95	Economics, investments and incentives of critical infrastructure protec=
tion
=95	Infrastructure dependencies: modeling, simulation, analysis and validat=
ion
=95	Critical infrastructure network and organizational vulnerability analys=
is=20
=95	Critical infrastructure threat and attack modelling=20
=95	Public-private partnership for critical infrastructure resilience=20
=95	Critical infrastructure protection polices at national and cross-border=
 levels=20
=95	Fault diagnosis for critical infrastructures
=95	Fault tolerant control for critical infrastructures
=95	Security and protection of smart buildings
=95	Detection and management of incidents/attacks on critical infrastructur=
es
=95	Preparedness, prevention, mitigation and planning

Call for Special Sessions

Proposals for organizing special sessions during CRITIS 2014 are cordially =
invited. Special sessions will comprise 4-6 papers presenting a unifying th=
eme of interest to the conference attendees from a diversity of viewpoints.=
 Special Session proposals from active research projects are particularly w=
elcomed. Proposals for special sessions must include the title of the sessi=
on, a paragraph describing the theme of the session, names and affiliation =
of the contributing authors, and tentative titles of the contributions.=20

The component papers must be submitted separately, by the respective author=
s, as per the regular submission procedure. Each paper in a proposed invite=
d session will be individually reviewed. Any rejected papers submitted as p=
art of an invited session will be removed and appropriate contributed paper=
s may be substituted, at the discretion of the Program Committee. Likewise,=
 selected papers from rejected invited sessions may be placed into other se=
ssions. Further exchanges may be made to ensure coherence of the sessions, =
at the discretion of the Program Committee.

Organizing Committee

Marios Polycarpou (University of Cyprus, General Co-Chair)
Elias Kyriakides (University of Cyprus, General Co-Chair)
Christos Panayiotou (University of Cyprus, Program Chair)
Vicen=E7 Puig (Universitat Polit=E8cnica de Catalunya, Program Co-Chair)
Erich Rome (Fraunhofer Institute for Intelligent Analysis and Information S=
ystems, Program Co-Chair)=20


alt.security.alarms Main Index | alt.security.alarms Thread Index | alt.security.alarms Home | Archives Home