[Message Prev][Message Next][Thread Prev][Thread Next][Message Index][Thread Index]
[EXTENSION DEADLINE - CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) - [FIRM DEADLINE: JULY 13th, 2021]
- Subject: [EXTENSION DEADLINE - CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021) - [FIRM DEADLINE: JULY 13th, 2021]
- From: Sergio González Muriel <callforpapers.cpsiotsec21@xxxxxxxxx>
- Date: Mon, 28 Jun 2021 00:45:06 -0700 (PDT)
- Newsgroups: alt.security.alarms
---------------------------------------------------------------------------=
------------------------------------
C a l l F o r P a p e r s
=20
2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 2021)
=20
**** EXTENSION 2 WEEKS (FIRM DEADLINE: JULY 13th, 2021) *****
=20
Seoul, South Korea, November 15 (Monday), 2021
=20
URL: https://cpsiotsec.github.io=20
=20
co-located with the ACM Conference on Computer and Communications Security =
(ACM CCS 2021)
=20
---------------------------------------------------------------------------=
------------------------------------
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
CONFERENCE OUTLINE:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
The Joint Workshop on CPS&IoT Security and Privacy invites academia, indust=
ry, and governmental entities to submit:
=20
- Original research papers on the security and privacy of CPS&IoT
- Systematization of Knowledge (SoK) papers on the security and privacy of=
CPS&IoT
- Demos (hands-on or videos) of testbeds/experiences of CPS&IoT security a=
nd privacy research
=20
We seek submissions from multiple interdisciplinary backgrounds tackling se=
curity and privacy issues in CPS&IoT,=20
including but not limited to:
=20
- Mathematical foundations for secure CPS/IoT
- Control-theoretic approaches
- High assurance security architectures
- Security and resilience metrics
- Metrics and risk assessment approaches
- Identity and access management
- Privacy and trust
- Network security
- Game theory applied to CPS/IoT security
- Human factors, humans in the loop, and usable security
- Understanding dependencies among security, reliability and safety in CPS/=
IoT
- Economics of security and privacy
- Intrusion and anomaly detection
- Model-based security systems engineering
- Sensor and actuator attacks
- CPS/IoT malware analysis
- CPS/IoT firmware analysis
- Hardware-assisted CPS/IoT security
=20
Also of interest will be papers that can point the research community to ne=
w research directions, and those that=20
can set research agendas and priorities in CPS/IoT security and privacy. Th=
ere will be a best paper award.
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
PAPER SUBMISSION:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
Submissions include long papers (12 pages), short papers (6 pages), and abs=
tracts (1 page):
=20
- Long papers include a) Original research on a CPS/IoT security and privac=
y topic, b) Systematization of Knowledge of CPS/IoT security and privacy;
- Short papers include original work-in-progress research on a CPS/IoT secu=
rity and privacy topic; and
- 1-page abstracts include demos/interesting findings/insights on CPS/IoT s=
ecurity and privacy, which will be accompanied by a hands-on demo during th=
e workshop.
=20
Submitted papers must include appendices and references (except for SoK pap=
ers where references are excluded).
=20
Submissions must use the ACM SIG Proceedings Templates (see https://www.acm=
.org/publications/proceedings-template,=20
with a simpler version here: https://github.com/acmccs/format). Only PDF fi=
les will be accepted.
=20
Accepted papers will be published by the ACM Press and/or the ACM Digital L=
ibrary. Submissions must not substantially overlap=20
with papers that have been published or that are simultaneously submitted t=
o a journal or a conference with proceedings. Each=20
accepted paper must be presented by a registered author. Submissions not me=
eting these guidelines risk immediate rejection.=20
For questions about these policies, please contact the chairs.
=20
NEW FOR 2021: The workshop will feature a second paper submission deadline =
for papers that have been submitted but not accepted to the main conference=
.=20
The deadline will be 10 days after the paper notification is out. Authors a=
re not required to upload CCS reviews; verification of CCS submission statu=
s will be done=20
by informing the program chairs of the paper ID of the CCS submission.
=20
Paper submission site: https://easychair.org/conferences/?conf=3Dcpsiotsec2=
021=20
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
IMPORTANT DATES:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
- **FIRM** Submission deadline: ***July 13, 2021*** (23:59 Anywhere on Eart=
h).
- Submission deadline applicable only to papers rejected from ACM CCS 2021:=
July 30, 2021 (23:59 Anywhere on Earth).=20
- Notification of acceptance/rejection (tentative): August 13, 2021.=20
- Deadline for submission of camera-ready papers (hard deadline): September=
6, 2021
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Program Committee Chairs:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
- Cristina Alcaraz, University of Malaga, Spain
=E2=80=93 Michail Maniatakos, New York University Abu Dhabi, UAE
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Program Committee:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
=E2=80=93 Magnus Almgren, Chalmers University, Sweden
=E2=80=93 Rakesh Bobba, Oregon State University, USA
=E2=80=93 Gedare Bloom, University of Colorado Colorado Springs, USA
=E2=80=93 Alvaro Cardenas, UC Santa Cruz, USA
=E2=80=93 Mauro Conti, University of Padua, Italy
=E2=80=93 Yongkai Fan, Communication University of China, China
=E2=80=93 Vasileios Gkioulos, Norwegian University of Science and Technolog=
y, Norway
=E2=80=93 Dawu Gu, Shanghai Jiao Tong University, China
=E2=80=93 Le Guan, University of Georgia, USA
=E2=80=93 Gerhard Hancke, City University of Hong Kong
=E2=80=93 Monowar Hasan, Wichita State University, USA
=E2=80=93 Sokratis Katsikas, Open University of Cyprus, Cyprus
=E2=80=93 Charalambos Konstantinou, Florida State University, USA
=E2=80=93 Marina Krotofil, Honeywell Industrial Cyber Security Lab, USA
=E2=80=93 Peng Liu, Pennsylvania State University, USA
=E2=80=93 Xiaofeng Lu, Beijing University of Posts and Telecommunications, =
China
=E2=80=93 Emil Lupu, Imperial College, UK
=E2=80=93 Weizhi Meng, Technical Universtiy of Denmark, Denmark
=E2=80=93 Sibin Mohan, University of Illinois at Urbana-Champaign, USA
=E2=80=93 Awais Rashid, University of Bristol, UK
=E2=80=93 George Stergiopoulos, University of the Aegean, Greece
=E2=80=93 Habeeb Olufowobi, Howard University, USA
=E2=80=93 Gang Tan, Pennsylvania State University, USA
=E2=80=93 Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Secu=
rity, Germany
=E2=80=93 Nektarios Georgios Tsoutsos, University of Delaware, USA
=E2=80=93 Claire Vishik, Intel, USA
=E2=80=93 Avishai Wool, Tel Aviv University, Israel
=E2=80=93 Min Yang, Fudan Fudan University
=E2=80=93 Stefano Zanero, Politecnico di Milano, Italy China
=E2=80=93 Yuqing Zhang, University of CAS=E2=80=93Jianying Zhou, Singapore =
University of Technology and Design, Singapore
=E2=80=93 Saman Zonouz, Rutgers University, USA
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Steering Committee:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
=E2=80=93 Rakesh Bobba, Oregon State University
=E2=80=93 Alvaro Cardenas, University of California, Santa Cruz
=E2=80=93 Peng Liu, Penn State University=E2=80=93Sibin Mohan, University o=
f Illinois at Urbana-Champaign
=E2=80=93 Awais Rashid, University of Bristol
=E2=80=93 Gang Tan, Penn State University
=E2=80=93 Nils Ole Tippenhauer, CISPA=E2=80=93Roshan Thomas, MITRE
=E2=80=93 Yuqing Zhang, University of CAS
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Publicity Chair:=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
- Sergio Gonzalez, University of Malaga, Spain
=20
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Web Chair:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=20
- Monowar Hasan, Wichita State University, USA
=20
alt.security.alarms Main Index |
alt.security.alarms Thread Index |
alt.security.alarms Home |
Archives Home