Τρίτη 24 Νοεμβρίου 2020

Ολοκληρώσαμε επιτυχώς το Special Session στο Cyber Security of Critical Infrastructures (CSCI)

Ολοκληρώθηκε με επιτυχία το Special Session στο Cyber Security of Critical Infrastructures (CSCI) στο πλαίσιο του συνεδρίου PCI 2020 - 24th Pan-Hellenic Conference on Informatics 

 

Σε ένα παράλληλο σύμπαν,  θα ήμασταν για μια ακόμη φορά στο PCI, το Πανελλήνιο Συνέδριο Πληροφορικής ανάμεσα σε πολύ καλούς φίλους και συναδέλφους.  Τόσα χρόνια αυτό το συνέδριο έχει δημιουργήσει σταθερές παρέες που περιμένουν αυτή την αφορμή για να ανταμώσουν.
Το φετινό PCI 2020 ήταν σίγουρα επιτυχημένο από ακαδημαϊκής επόψεως. Στο επόμενο ελπίζω ότι θα ξαναβρεθούμε όλοι από κοντά. Το CfP από το Special Session για αναμνηστικούς λόγους.

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. Vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyberattacks, their protection becomes a significant issue for any organization as well as nation. The risks to continued operations from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes are considered higher given the demonstrable impact of such circumstances.

Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioral aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace.

In this Special Track, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry are welcome to contribute.
We seek original and high-quality submissions on, but not limited to, one or more of the following topics:


  • Cyber security of complex and distributed critical infrastructures;
  • Cyber security of industrial control systems;
  • Cyber security modeling and simulation;
  • Cyber threat modeling and analysis;
  • Safety-security interactions;
  • Behavioral modeling;
  • Network security and protocols;
  • Security, privacy, and legal issues of big data and the Internet of Things;
  • Cyber threat intelligence;
  • Situational awareness;
  • Attack modeling, prevention, mitigation, and defense;
  • Critical infrastructure security policies, standards and regulations;
  • Vulnerability and risk assessment methodologies for distributed critical infrastructures;
  • Risk management and cyber insurance;
  • Simulation and test beds for the security evaluation of critical infrastructures;
  • Resiliency and security of cyber systems;
  • Cyber security and privacy policy;
  • Hardware security solutions;
  • Incident response;
  • Encryption, authentication, availability assurance;
  • Human awareness and training;
  • Intrusion detection;
  • Trust and privacy;
  • Secure communication protocols;
  • Malware analysis;
  • Blockchain and ZKPs