CRITIS 2021: The 16th International Conference on Critical Information Infrastructures Security EPFL SwissTech Convention Center Lausanne, Switzerland, September 27-29, 2021 |
Conference website | https://critis2021.org/ |
Submission link | https://easychair.org/conferences/?conf=critis2021 |
Submission deadline | May 14, 2021 |
Submission deadline of Industrial/practical experience reports | June 11, 2021 |
Notification to authors | July 5, 2021 |
Camera-ready papers | September 10, 2021 |
Ten years ago CRITIS 2011 was held in Lucerne. On September 27, 28 & 29, 2021, the 16th International Conference on Critical Information Infrastructures Security (CRITIS 2021) will be back at EPFL, Switzerland!
CRITIS 2021 will be held either in person or virtually, and all accepted papers will be published by Springer LNCS, as in previous CRITIS conferences. This year, we will also offer the inclusion of embedded videos in proceedings papers.
Important Dates
14 May 2021 (AoE) – Regular paper submission
11 June 2021 (AoE) – Submission of industrial/practical experience reports and testbeds/datasets reports
5 July 2021 (AoE) – Notification to authors
10 Sept 2021 (AoE) – Camera-ready papers
27-28-29 Sept 2021 – Conference dates
***Please note that no deadline extension will be granted***
Submission Guidelines
----------------------------------------------
Regular papers
----------------------------------------------
Regular papers must be original and not simultaneously submitted to another journal or conference. The following paper categories are welcome:
- Full papers – scientific research papers, surveying works and industrial experiences describing significant advances in C(I)IP. Papers should be no longer than 20 pages, including bibliography and well‐marked appendices;
- Short papers – early results or work in progress with initial findings. Papers should be 4 to 6 pages long.
Any submission needs to be explicitly marked as “full paper” or “short paper”. All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review by at least three reviewers. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process.
Submissions should be made according to the Springer LNCS format (LaTeX template, Word template). For optimisation reasons, authors are strongly encouraged to use the following LaTeX Proceedings Templates available in the scientific authoring platform Overleaf. Kindly note that we prefer the use of American English. Maximum length of text abstracts: 180 Words.
For detailed guidelines, please refer to the official Guidelines for Authors of Papers to be Published in Springer Computer Science Proceedings (pdf).
----------------------------------------------
Industrial/practical experience reports and testbeds/datasets reports
----------------------------------------------
- Papers of up to 2 pages in length (including references and figures), using the Springer format;
- The submissions are NOT anonymised;The title of the submission must include the words “Industry/Experience report” or “Industry/Experience report” as appropriate.
List of Topics
Topic 1: Protection of Cyber-Physical Systems and Industrial Control Systems
- Protection of industrial installations and industrial control systems (ICS), such as: supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), remote terminal units (RTU) and programmable logic controllers (PLC)
- Vulnerability and risk analysis / threat modelling
- Cyber-security in C(I)I systems and embedded systems (e.g. SMART instrumentation)
- Self-healing, self-protection, and self-management architectures for C(I)I
- Fault-tolerant control for cyber-physical systems in C(I)I
- Modelling and analysis of cyber-physical systems in C(I)I
- Exploration of the privacy / utility trade-off in C(I)IP
- New developments in security operations center (SOC) and security information and event management (SIEM) for C(I)IP
- Distributed privacy-preserving cyber threat intelligence sharing platform for C(I)I (e.g., MISP, TheHive, Cortex, OpenCTI, etc.)
Topic 2: C(I)IP Organisation, (Strategic) Management and Legal Aspects
- Operational technology (OT) security
- Standards and frameworks for improving critical infrastructure cybersecurity (e.g., NIST, ISO/IEC 27001 & 22301, Cobit, ITIL, etc.)
- Cross-border issues regarding the Network and Information Security (NIS) Directive
- Security information sharing for C(I)IP and information sharing and analysis centers (ISACs)
- C(I)IP policies at international, national and cross-border levels (e.g., public-private partnerships)
- Economics, investments and incentives for C(I)IP
- Digital forensics and attack attribution in the context of C(I)I
- International approaches to C(I)IP including identification of C(I)I elements
- Risk management, impact and consequence analysis regarding C(I)I
- Coherent prevention, preparedness / exercises, incident management / mitigation, and recovery approaches to C(I)I
- Resilience and survivability of C(I)I as complex cyber-physical systems
- R&D agenda at national and international levels for C(I)IP
- Defence of civilian C(I)I in conflicts with cyber-warfare elements
- Infrastructure, architectural and technology changes impacting C(I)I-sectors (e.g., smart grids and energy supply in smart-city developments)
Topic 3: Human Factor, Security Awareness and Crisis Management for C(I)IP and Critical Services
- Analysis of human factor and security awareness in C(I)IP
- Impact of the COVID-19 pandemic on C(I)IP
- Supply chain cyber-attack and C(I)IP
- Advanced decision support for mitigating C(I)I related emergencies
- Social aspects and public communication in C(I)IP
- Psycho-social dimensions of crisis management and intervention with C(I)I
- Training for C(I)IP and effective intervention
- The role of social-medias in C(I)I-related crisis management (as a threat or a benefit)
- Recent trends in cyber-economy (clouds, quasi-monopolies, e-currencies, etc.) and implications for C(I)IP
- Impact of geopolitical and social factors on C(I)IP
Topic 4: Future, TechWatch & Forecast for C(I)IP and Critical Services
- Technology forecasting, monitoring, foresight, scouting, horizon scanning for C(I)IP and critical services
- Production-capability networks, innovation structures and dynamics underlying the technology lifecycle for C(I)IP
- Modelling portfolios of emerging and/or disruptive technologies related to C(I)IP
- Applying real-option models to capture the net-present value of uncertain innovation portfolios for C(I)IP
- New platforms for financing and data management (e.g., blockchains)
- New Internet architectures, IoT infrastructure and emerging standards
- Artificial intelligence (AI) and machine learning for autonomous management of C(I)I (e.g., anomaly detection)
- Digital twins and their deployment as augmented reality for training and scenario-risk analysis
- New communication technologies (e.g., 5G) and their potential impact on C(I)I
Committees
Program Committee
Final list (last update: 03.06.2021)! Names were added as members give their consent.
- Alain Mermoud (Chair), Cyber-Defence Campus, armasuisse S+T
- Dimitri Percia David (Chair), University of Geneva
- Cristina Alcaraz, University of Malaga
- Magnus Almgren, Chalmers University of Technology
- Fabrizio Baiardi, University of Pisa
- Sandro Bologna, Italian Association of Critical Infrastructure Experts (AIIC)
- Tom Chothia, University of Birmingham
- Gregorio D’Agostino, Italian National Agency for New Technologies, Energy and Sustainable Economic Development (ENEA)
- Geert Deconinck, KU Leuven
- Steven Furnell, University of Nottingham
- Jairo Giraldo, University of Utah
- Dimitris Gritzalis, Athens University of Economics & Business
- Bernhard Hämmerli, Lucerne University of Applied Sciences, Acris GmbH, Switzerland
- Chris Hankin, Imperial College London
- Grigore M. Havarneanu, International Union of Railways (UIC)
- Chad Heitzenrater, University of Oxford, US Air Force Research Laboratory
- Kévin Huguenin, University of Lausanne
- Mathias Humbert, Cyber-Defence Campus, armasuisse S+T
- Mikel Iturbe, Mondragon Unibertsitatea
- Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign
- Sokratis Katsikas, Norwegian University of Science and Technology
- Marieke Klaver, TNO
- Vytis Kopustinskas, European Commission, Joint Research Centre
- Panayiotis Kotzanikolaou, University of Piraeus
- Marina Krotofil, Hamburg University of Technology
- Jean-Yves Le Boudec, EPFL
- Vincent Lenders, Cyber-Defence Campus, armasuisse S+T
- Javier Lopez, University of Malaga
- Thomas Maillart, University of Geneva
- Linas Martišauskas, Lithuanian Energy Institute
- Marcelo Masera, European Commission, Joint Research Centre
- Kieran Mclaughlin, Queen’s University Belfast
- Simin Nadjm-Tehrani, Linköping university
- Stefano Panzieri, Roma Tre University
- Mario Paolone, EPFL
- Adrian Perrig, Network Security Group, ETH Zurich
- Stefan Pickl, Universität der Bundeswehr München
- Ludovic Pietre-Cambacedes, EDF
- Peter Popov, City University London
- Awais Rashid, University of Bristol
- Anne Remke, University of Münster
- Brian Sadler, US Army Research Laboratory
- Andre Samberg, European Commission
- Henrik Sandberg, KTH Royal Institute of Technology
- Patrick Schaller, System Security Group, ETH Zurich
- Roberto Setola, Università Campus Bio-Medico di Roma
- Florian Skopik, Austrian Institute of Technology (AIT)
- Vladimir Stankovic, City University London
- Martin Strohmeier, University of Oxford, Cyber-Defence Campus, armasuisse S+T
- Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
- Alberto Tofani,
- Italian National Agency for New Technologies, Energy and Sustainable Economic Development (ENEA)
- Claire Vishik, Intel Corporation (UK)
- Jianying Zhou, Singapore University of Technology and Design
- Inga Žutautaitė, Lithuanian Energy Institute
Organizing committee
- Alain Mermoud (General Chair), Cyber-Defence Campus, armasuisse S+T
- Thomas Maillard (General Co-chair), University of Geneva
- Dimitri Percia David (Program Co-Chair), University of Geneva
Publication
As per tradition, post-proceedings will be published in Springer Lecture Notes in Computer Science (LNCS).
Venue
CRITIS 2021 will be held in Lausanne (Switzerland) at the EPFL SwissTech Convention Center (STCC) – ROOM GARDEN ABC – ideally located on the EPFL campus.
Contact
Don’t hesitate to reach out at info@critis2021.org