Cybersecurity for Critical Infrastructure Systems (CCIS 2022)

This workshop, collocated with the 6th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2022)


Scope

With advances in various technological fields, critical infrastructures have been developed in many industries, e.g., communications, commercial facilities, critical manufacturing sector, defense, energy, food and agriculture, financial services, to just name a few. One of the major characteristics of these infrastructures is that they are all connected online, making them as cyber-physical systems. Although this connectivity improves their services, it also makes them vulnerable to complex security threats. The systems, networks and assets of these infrastructures, whether physical or virtual, are so vital that such threats would have a debilitating effect on their services and customers or even national security. As the recent cyberattacks on critical infrastructure become more sophisticated and increase exponentially, there is urgent need to leverage the latest advances in the domain of data science, game theory, machine learning and deep learning to develop cyber security solutions that can provide timely detection and rapid response to cyberattacks through real-time analysis. This workshop, collocated with the 6th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2022), will solicit novel solutions for effective detection and prevention of zero-day attacks, APTs and other sophisticated cyberattacks for cyber-physical systems.


WORKSHOP AREAS

Topics of interest include but not limited to:

1.Machine learning techniques for cyber-physical systems (CPS) security 
2. Deep learning techniques for CPS security
3.Threat and vulnerability analysis for CPS  
4. Secure network architecture for CPS
5. Secure data management approaches for CPS
6. Cybersecurity prevention and response strategies for CPS
7. Cyberattacks prediction for CPS
8. Network forensics for CPS


PAPER SUBMISSION

All submissions should be written in English and submitted via our submission system: https://cmt3.research.microsoft.com/CCIS2022

A paper submitted to CCIS 2022 cannot be under review for any other conference or journal during the entire period that it is considered for CCIS 2022, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided below. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings. If you have any question on CCIS 2022, please feel free to contact Prof. Daojing He: hedaojinghit@163.com


IMPORTANT DATES

Full paper due: April 30, 2022
Acceptance notification: June 18, 2022
Camera-ready copy: June 30, 2022
Conference Date: July 11-13, 2022

ORGANIZATION

WORKSHOP GENERAL CHAIR

Daojing HeHarbin Institute of Technology (Shenzhen), China 

WORKSHOP CO-CHAIR

Yong Ding, Guilin University of Electronic Technology, China
Sammy Chan,City University of Hong Kong, Hong Kong, China
Shui Yu, University of Technology Sydney, Australia

PROGRAM COMMITTEE

Chen Lin, School of Cyberspace Security, Chengdu University of Information Technology
Zhixiong Chen,School of Mathematics and finance,Putian University
Guoming Lai, SchooI of Computer Science and Engineering, Huizhou University.
Debiao He, School of Cyber Science and Engineering, Wuhan University.
Shichong Tan, School of Cyber Engineering, Xidian University
Guangxia Xu, School of Software Engineering, Chongqing University of Posts and Telecommunications
Zhang Xuefeng,School of cyberspace security, Xi'an university of posts and telecommunications.
Kai Lei, Peking University Shenzhen Graduate School
Weichao Wang, University of North Carolina Charlotte
Bing Xia, Froniter information technology research Institute, Zhongyuan University of Technology
Wei Gao, School of Information Science and Technology, Yunnan Normal University
Minghui Zheng, School of Information Engineering, Hubei Minzu University



footer