Call for papers
Ημερομηνία 07/03/13 08:32
Θέμα Δράσεις - Συνέδρια


Trusted Computing for Critical Information Infrastructures - T(CI)2 Invited Session  in  the 4th IISA Conference, July 10-12, 2013, Piraeus, Greece --

Critical Information Infrastructures (CIIs) are complex systems including both cyber (control) and physical (operational) components.
The proper control, connectivity and interoperability of CIIs are vital for the normal operation, safety and security of major facilities and services such as energy, water provision, ICT, financial services and transportation.

However, the need for remote access and control, the provision of e/m-services that are accessible through the Internet and the dependencies between CIIs exposes them to various threats, while their distributed nature makes them subject to hardware, software and human-behavior vulnerabilities. Possible cyber attacks against CIIs may lead to severe impact due to service unavailability (e.g. via DoS and DDoS attacks), unauthorized access and data exposure and/or modification (e.g. via worms, viruses and drive-by exploits) or unauthorized administration (e.g. via hidden Command & Control channels, botnets and rootkits).

Our goal is to bring together academic and industrial researchers, designers, and service providers focusing on Critical Information Infrastructure Protection during normal or emergency operation modes.
Emphasis will be given to cyber security technologies, architectures, controls and policies that create a Trusted Computing Environment, in order to provide trustworthy and reliable Critical Information Infrastructures.

Topics of interest
* Critical Information Infrastructure Protection (CIIP), including energy, ICT and transportation
* Cyber-physical security analysis
* Trusted Computing technologies for CIIP (such as virtualization, Cloud computing, Grid computing)
* Trusted Computing policies and models (access policies, authentication models, cryptographic support)
* Interconnection and dependencies of CIIs
* Trust Models and Trust Infrastructures for systems under attack
* Self-healing and self-protection systems and architectures
* Forensics for CIIs
* Managing and Forecasting of Security & Privacy Incidents and Impacts
* Malware protection (Trojans, viruses, worms, spyware etc)
* Security and  Privacy of Smart Grids, Cloud Computing and Internet of Things
* DDoS attacks and defense mechanisms (Botnets, C&C systems and covert
* SCADA Security
* Case studies and best practices

Important Dates
- Paper submission due: March 24, 2013
- Author notification: April 30, 2013
- Camera-ready due: May 15, 2013
- Conference: 10-12 July, 2013

Paper submission - Author Information

For detailed paper submission and Information for Authors, please visit:

Accepted papers will be published in the IEEE Proceedings of IISA2013 and in the IEEE Xplore digital library (

Best papers of the T(CI)2 will be considered for publication in the International Journal of Critical Infrastructure Protection, Elsevier


Program Co-Chairs

Panayiotis Kotzanikolaou, U. of Piraeus, Greece Despina Polemi, U. of Piraeus, Greece

Program Committee

Sandro Bologna, AIIC, Italy
Mike Burmester, Florida State U., USA
Lorenzo Cavallaro, Royal Holloway, U. of London, UK Vassilios Chrissikopoulos, Ionian U., Greece Christos Douligeris, U. of Piraeus, Greece Dimitris Gritzalis, AUEB, Greece Bernhard HΓmmerli, Lucerne U. of Applied Sciences & Arts, Switzerland Sokratis Katsikas, U. of Piraeus, Greece Costas Lambrinoudakis, U. of Piraeus, Greece Javier Lopez, U. of Malaga, Spain Emmanuil Magkos, Ionian U., Greece Haralambos Mouratidis, U. of East London, UK Vangelis Ouzounis, ENISA Aljosa Pasic, Atos Rerearch Paul Spirakis, U. of Patras, Greece Ioannis Stamatiou, U. of Patras, Greece Marianthi Theoharidou, AUEB, Greece Stephen Wolthusen, Royal Holloway, U. of London, UK Christos Xenakis, U.of Piraeus, Greece


Το άρθρο αυτό προέρχεται από ΕΠΥ

Το URL της ιστορίας αυτής είναι ο εξής