{"id":11,"date":"2020-06-01T10:33:19","date_gmt":"2020-06-01T10:33:19","guid":{"rendered":"https:\/\/kioswebsvr1.koios.ucy.ac.cy\/critis2014\/?page_id=11"},"modified":"2020-06-12T13:06:24","modified_gmt":"2020-06-12T13:06:24","slug":"cfp","status":"publish","type":"page","link":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/cfp\/","title":{"rendered":"CFP"},"content":{"rendered":"\n<h4 class=\"has-text-align-center wp-block-heading\"><strong>download the call for papers in\u0392&nbsp;<a href=\"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-content\/uploads\/2020\/06\/CRITIS2014_call-for-papers_v14.pdf\">PDF<\/a><\/strong><\/h4>\n\n\n\n<p>Modern society relies on the availability and smooth operation of a variety of complex engineering systems.\u0392&nbsp;These systems are termed Critical Infrastructure Systems (CIS). Some of the most prominent examples of\u0392&nbsp;critical infrastructure systems are electric power systems, telecommunication networks, water distribution\u0392&nbsp;systems, transportation systems, wastewater and sanitation systems, financial and banking systems, food\u0392&nbsp;production and distribution, and oil\/natural gas pipelines. Our everyday life and well-being depend heavily on the reliable operation and efficient management of these critical infrastructures. The citizens expect that critical infrastructure systems will always be available and that, at the same time, they will be managed efficiently (i.e., they will have a low cost). Experience has shown that this is most often true. Nevertheless, critical infrastructure systems fail occasionally. Their failure may be due to natural disasters (e.g., earthquakes and floods), accidental failures (e.g., equipment failures, software bugs, and human errors), or malicious attacks (either direct or remote). When critical infrastructures fail, the consequences are tremendous. These consequences may be classified into societal, health, and economic.<\/p>\n\n\n\n<p>On behalf of the Steering Committee and the Local Organizing Committee we invite you to submit papers and attend the&nbsp;<strong>CRITIS 2014<\/strong>&nbsp;conference. CRITIS 2014 continues a well-established tradition of successful annual conferences. It aims at bringing together researchers and professionals from academia, industry and governmental organizations working in the field of the security of critical infrastructure systems.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-content\/uploads\/2013\/11\/Lemesos_Pissouri.jpg\" alt=\"Lemesos_Pissouri\" class=\"wp-image-193\"\/><\/figure><\/div>\n\n\n\n<p><strong>Important dates<\/strong><br>Deadline for invited session proposals:&nbsp;April 22, 2014<br>Deadline for submission of papers:&nbsp;June 20, 2014<br>Notification to authors: August 10, 2014<br>Camera-ready papers: September 10, 2014<\/p>\n\n\n\n<p><strong>Venue<\/strong><br><a href=\"https:\/\/www.kios.ucy.ac.cy\/critis2014\/venue\/\">GrandResort Limassol, Cyprus<\/a><\/p>\n\n\n\n<p><strong>Submission<\/strong><\/p>\n\n\n\n<p>The manuscripts should be submitted in PDF format and they should follow the\u0392&nbsp;Springer-Verlag Lecture Notes in Computer Science template.\u0392&nbsp;Papers should be no longer than 12 pages in English, including bibliography and well-marked appendices.<\/p>\n\n\n\n<p>Paper submission will be done\u0392&nbsp;via EasyChair.\u0392&nbsp;<strong>To submit your paper use the following link:\u0392&nbsp;<\/strong><a href=\"https:\/\/www.easychair.org\/conferences\/?conf=critis2014\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.easychair.org\/conferences\/?conf=critis2014<\/a><\/p>\n\n\n\n<p>The submitted paper (in PDF or PostScript format) should follow the respective\u0392\u00a0<a rel=\"noreferrer noopener\" href=\"http:\/\/goo.gl\/YXu5Xg\" target=\"_blank\">template\u0392\u00a0offered by Springer<\/a>:\u0392\u00a0Template in\u0392\u00a0LaTeX\u0392\u00a0(sample file) and Template in\u0392\u00a0Word 2007\u0392\u00a0or\u0392\u00a0<a href=\"http:\/\/goo.gl\/iia0qe\">Word 2003<\/a><\/p>\n\n\n\n<p>All accepted papers will be included in the conference proceedings which will be distributed during the conference.<\/p>\n\n\n\n<p>Selected papers will also be included in a special volume and published by&nbsp;<a href=\"http:\/\/www.springer.com\/computer\/lncs\">Springer-Verlag \u0392&nbsp;Lecture Notes in Computer Science<\/a>.<\/p>\n\n\n\n<p><strong>Topics<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Infrastructure resilience and survivability<\/li><li>Security and protection of complex cyber-physical systems<\/li><li>Self-healing, self-protection, and self-management architectures<\/li><li>Cyber security in critical infrastructure systems<\/li><li>Critical (information-based) infrastructures exercises and contingency plans<\/li><li>Advanced forensic methodologies for critical information infrastructures<\/li><li>Economics, investments and incentives of critical infrastructure protection<\/li><li>Infrastructure dependencies: modeling, simulation, analysis and validation<\/li><li>Critical infrastructure network and organizational vulnerability analysis<\/li><li>Critical infrastructure threat and attack modeling<\/li><li>Public-private partnership for critical infrastructure resilience<\/li><li>Critical infrastructure protection polices at national and cross-border levels<\/li><li>Fault diagnosis for critical infrastructures<\/li><li>Fault tolerant control for critical infrastructures<\/li><li>Security and protection of smart buildings<\/li><li>Detection and management of incidents\/attacks on critical infrastructures<\/li><li>Preparedness, prevention, mitigation and planning<\/li><\/ul>\n\n\n\n<p><strong>Call for Special Sessions<\/strong><br>Proposals for organizing special sessions during CRITIS 2014 are cordially invited. Special sessions will\u0392&nbsp;comprise 4-6 papers presenting a unifying theme of interest to the conference attendees from a diversity of\u0392&nbsp;viewpoints. Special Session proposals from active research projects are particularly welcomed. Proposals for\u0392&nbsp;special sessions must include the title of the session, a paragraph describing the theme of the session, names\u0392&nbsp;and affiliation of the contributing authors, and tentative titles of the contributions.<\/p>\n\n\n\n<p>The component papers must be submitted separately by the respective authors,\u0392&nbsp;as per the regular submission\u0392&nbsp;procedure.\u0392&nbsp;\u0392&nbsp;For the special sessions both regular papers and extended abstracts will be considered. \u0392&nbsp;Each paper in a proposed invited session will be individually reviewed. Any rejected papers\u0392&nbsp;submitted as part of an invited session will be removed and appropriate contributed papers may be\u0392&nbsp;substituted, at the discretion of the Program Committee. Likewise, selected papers from rejected invited\u0392&nbsp;sessions may be placed into other sessions. Further exchanges may be made to ensure coherence of the\u0392&nbsp;sessions, at the discretion of the Program Committee.<\/p>\n\n\n\n<p><strong>Organizing Committee<\/strong><br>Marios Polycarpou (University of Cyprus, General Co-Chair)<br>Elias Kyriakides (University of Cyprus, General Co-Chair)<br>Christos Panayiotou (University of Cyprus, Program Chair)<br>Vicen\u0393\u00a7 Puig (Universitat Polit\u0393\u00a8cnica de Catalunya, Program Co-Chair)<br>Erich Rome (Fraunhofer Institute for Intelligent Analysis and Information Systems, Program Co-Chair)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>download the call for papers in\u0392&nbsp;PDF Modern society relies on the availability and smooth operation of a variety of complex engineering systems.\u0392&nbsp;These systems are termed Critical Infrastructure Systems (CIS). Some of the most prominent examples of\u0392&nbsp;critical infrastructure systems are electric power systems, telecommunication networks, water distribution\u0392&nbsp;systems, transportation systems, wastewater and sanitation systems, financial and banking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-11","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":5,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/pages\/11\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/www.kios.ucy.ac.cy\/critis2014\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}