The 3rd International Workshop on Engineering and Cybersecurity of Critical Systems
Call for Papers
This workshop invites paper contributions from research scholars and practitioners working on challenges and solutions for engineering and cybersecurity of critical systems in the 4th Industrial Revolution. The workshop invites papers within the following topics, but are not limited to:
- Integrated and secured software engineering processes and methods for reliable critical infrastructure;
- Safety by design in software engineering;
- Security by design in software engineering;
- Software engineering techniques enabling digital twin;
- Simulation technology for analysis on safety, reliability, security, etc.;
- Threats and risks modeling to critical infrastructures;
- Cybersecurity risk visualization during development and operation;
- Human factors in cyber security software engineering
We accept position papers, research papers, and industrial experience papers. We highly value industrial experience and lessons learned, this includes also academic papers where research artefacts have been applied in an industrial context.
Workshop proceedings will be prepared by IEEE CPS and published in ACM Digital Library and IEEE eXplore Digital Library. Workshop papers must follow the ACM formatting instructions: https://www.acm.org/publications/proceedings-template . Papers must have a maximum length of 8 pages.
All paper should be submitted in PDF through the HotCRP platform of the workshop: https://encycris22.hotcrp.com/.
Each paper will be reviewed by on the basis of technical quality, relevance, significance, and clarity by the program committee.
Workshop Papers Submission Deadline:
14 January 2022 Extended 21 January 2022
Acceptance of paper: 25 March 2022.
Mon 16 MayDisplayed time zone: Eastern Time (US & Canada) change
04:00 - 04:45
|Keynote: "The challenges of gaining insights into highly critical systems."
04:45 - 06:15
|Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities
|A Reimagined Catalogue of Software Security Patterns
|Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams
|Building a Hardware-In-the-Loop (HIL) Digital Energy Station Infrastructure for Cyber Operation Resiliency Testing.
06:30 - 07:10
|Session 1 Q&A - Security Pattern and Critical Infrastructure
07:10 - 08:20
|Predicting the Severity and Exploitability of Vulnerability Reports using Convolutional Neural Nets
|Relationship-Based Threat Modeling
|A Survey of Security Vulnerabilities in Android Automotive Apps
08:30 - 09:00
|Session 2 Q&A - Threat and Vulnerabilities Analysis
Not scheduled yet
|Not scheduled yet