Siirry suoraan sisältöön

Call for papers

Deadline for the accepted, rewritten, ready papers is Tuesday the 31st of October.

The post-proceedings will be published in Springer Lecture Notes in Computer Science (LNCS) next spring. Should you have questions, please contact annaleena.sevillano(at)laurea.fi

CRITIS 2023 continues the tradition of bringing forth innovative research in the field of critical information infrastructures protection C(I)IP, exploring ideas that address challenges to resilience and societal safety & security, and fostering dialogue with stakeholders.

CRITIS2023 welcomes especially but not limited to research topics focusing on information exchange security and securing information infrastructures in various ways, also topics related to hybrid threats and critical information infrastructure security are encouraged. Furthermore, during 2023 papers focusing on complex safety & security, digital twins, technology forecasting, monitoring, foresight, scouting for C(I)IP are most welcome in a special TechWatch & TechForecast track

Moreover, CRITIS 2023 will also focus on the critical infrastructure protection in general and in the context of C(I)IP. Papers, testbeds, datasets reports, industrial/practical experience reports on that crisis are specially welcome.

Deadline is the 1st of June 2023.

CRITIS 2023 topics include (but are not limited to):

  • Control Towers and Intelligent Reachback Systems
  • Protection of industrial installations and industrial control systems (ICS), such as: supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), remote terminal units (RTU) and programmable logic controllers (PLC)
  • Vulnerability and risk analysis / threat modelling
  • Cyber-security in C(I)I systems and embedded systems (e.g. SMART instrumentation)
  • Self-healing, self-protection, and self-management architectures for C(I)I
  • Fault-tolerant control for cyber-physical systems in C(I)I
  • Modelling and analysis of cyber-physical systems in C(I)I
  • Exploration of the privacy / utility trade-off in C(I)IP
  • Distributed privacy-preserving cyber threat intelligence sharing platform for C(I)I (e.g., MISP, TheHive, Cortex, OpenCTI, etc.)
  • New developments in security operations center (SOC)
  • Operational technology (OT) security
  • Standards and frameworks for improving critical infrastructure cybersecurity (e.g., NIST, ISO/IEC 27001 & 22301, Cobit, ITIL, etc.)
  • Cross-border issues regarding the Network and Information Security (NIS) Directive
  • Security information sharing for C(I)IP and information sharing and analysis centers (ISACs)
  • C(I)IP policies at international, national and cross-border levels (e.g., public-private partnerships)
  • Economics, investments and incentives for C(I)IP
  • Digital forensics and attack attribution in the context of C(I)I
  • International approaches to C(I)IP including identification of C(I)I elements
  • Risk management, impact and consequence analysis regarding C(I)I
  • Coherent prevention, preparedness / exercises, incident management / mitigation, and recovery approaches to C(I)I
  • Resilience and survivability of C(I)I as complex cyber-physical systems
  • R&D agenda at national and international levels for C(I)IP 
  • Defence of civilian C(I)I in conflicts with cyber-warfare elements
  • Infrastructure, architectural and technology changes impacting C(I)I-sectors (e.g., smart grids and energy supply in smart-city developments)
  • Analysis of human factor and security awareness in C(I)IP
  • Impact of the COVID-19 pandemic on C(I)IP
  • Impact of geopolitical and social factors on C(I)IP
  • Advanced decision support for mitigating C(I)I related emergencies
  • Social aspects and public communication in C(I)IP
  • Psycho-social dimensions of crisis management and intervention with C(I)I
  • Training for C(I)IP and effective intervention
  • The role of social-medias in C(I)I-related crisis management (as a threat or a benefit)
  • Recent trends in cyber-economy (clouds, quasi-monopolies, e-currencies, etc.)
    and implications for C(I)IP
  • Supply chain cyber-attack and C(I)IP
  • Technology forecasting, monitoring, foresight, scouting,
    horizon scanning for C(I)IP and critical services
  • Production-capability networks, innovation structures and dynamics underlying the technology lifecycle for C(I)IP
  • Modelling portfolios of emerging and/or disruptive technologies related to C(I)IP
  • Applying real-option models to capture the net-present value of uncertain innovation portfolios for C(I)IP
  • New platforms for financing and data management (e.g., blockchains)
  • New Internet architectures, IoT infrastructure and emerging standards
  • Artificial intelligence (AI) and machine learning for autonomous management of C(I)I
    (e.g., anomaly detection)
  • New communication technologies (e.g., 5G) and their potential impact on C(I)I
  • Digital twins and their deployment as augmented reality for training and scenario-risk analysis
  • Railway Safety
  • Transport and Logistic Security
  • Maritime Security
  • Energy Security
  • Attacker-Defender Scenarios
  • Quantum Computing
  • Reinforcement Learning
  • Data Driven Optimization
  • Intelligence Automation
  • Small and Big Data Approaches in Intelligence Analysis
  • OR-Based Intelligence Analysis
  • Complexity of Cyber Physical Systems
  • Philosophical Reflections

Paper Submission & Guidelines

All submissions are made through EasyChair (please only use this link for submission). As per tradition, post-proceedings will be published in Springer Lecture Notes in Computer Science (LNCS).

Deadline is the 1st of June 2023.

Regular paper submission guidelines

The following two paper categories are welcome. Any submission needs to be explicitly marked as “full paper” or “short paper”.

Full papers – scientific research papers, surveying works and industrial experiences describing significant advances in C(I)IP. Papers should be no longer than 20 pages, including bibliography and well‐marked appendices.

Short papers – early results or work in progress with initial findings. Papers should be 4 to 6 pages long, including bibliography and well‐marked appendices.

All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review by at least three reviewers. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process.

Submission

Submitted manuscripts should represent significant and novel research contributions.

All manuscripts will have to be submitted in anonymized form for double-blind review(See https://cacm.acm.org/magazines/2018/6/228027-effectiveness-of-anonymization-in-double-blind-review/abstract for arguments substantiating this change.)

To that effect:

  • The title page should not contain any author names or affiliations.
  • Authors should carefully review figures and appendices (especially survey instruments) to ensure affiliations are not accidentally included.
  • When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible.
  • Authors may include links to websites that contain source code, tools, or other supplemental material. Neither the link in the paper nor the website or any of the materials therein may contain the authors’ names and affiliations.

Papers that are not properly anonymized may be rejected without review.

While submitted papers must be anonymous, authors may choose to give talks about their work, post a preprint of the paper online, disclose security vulnerabilities to vendors or the public, etc. during the review process.

Submissions should be made according to the Springer LNCS format (Word template). For optimisation reasons, authors are strongly encouraged to use the following LaTeX Proceedings Templates available in the scientific authoring platform Overleaf. Kindly note that we prefer the use of American English. Maximum length of text abstracts: 180 words.

For detailed guidelines, please refer to the official Guidelines for Authors of Papers to be Published in Springer Computer Science Proceedings.

Industrial/practical experience reports and testbeds/datasets reports submission guidelines

The submissions in these sessions have the following characteristics:

  • Papers of up to 2 pages in length (including references and figures), using the Springer format;
  • The submissions are NOTanonymised;
  • The title of the submission must include the words “Industrial/Practical Experience report” OR “Testbeds/Datasets report.

Submissions should be made according to the Springer LNCS format (LaTeX templateWord template). For optimisation reasons, authors are strongly encouraged to use the Springer’s LaTeX template available directly in Overleaf. Kindly note that we prefer the use of American English. Maximum length of text abstracts: 180 words.

Deadline is the 15th of June 2023.