ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Gregorio Martinez <[log in to unmask]>
Reply To:
Gregorio Martinez <[log in to unmask]>
Thu, 26 Jun 2014 20:13:12 +0200
text/plain (92 lines)
Apologies for cross-posting

Special issue on Critical Systems Modeling and Security
Elsevier Computers & Electrical Engineering
Manuscript Due: September 30, 2014 (Extended deadline)

Aim and scope

Modeling is an essential tool for the study and analysis of security and dependability of Critical Information Infrastructures. It can be used to 
evaluate properties such as disruption, disturbance and loss of information, and to anticipate incidents that could lead to situations involving 
economical, material and, even, human loss. This special issue is intended to report the most recent research works related to security threats, 
critical service malfunctioning or information leakage targeting, among others, SCADA, Industrial Control Systems and other Critical Scenarios, 
associated to both government and industrial companies. It also seeks to report new needs, approaches, methods and tools addressing this crucial topic.

The objective is to bring together advances particularly in the following fields:

- Attack and vulnerability analysis
- Benchmarking and statistical analysis tools
- Critical Infrastructure Protection (CIP)
- Cybersecurity and cyberwarfare modeling
- Continuity of services
- Dependable communication models
- Early Warning Systems
- Embedded Technologies Security
- Intrusion detection and prevention in Critical Scenarios
- Fault tolerance and incident response
- Risk analysis and management
- SCADA/DCS and Control System Security
- Secure information sharing
- Security and dependability logistic models
- Self-management architectures
- Situation awareness and response optimization
- Trust and reputation management in Critical Scenarios

Submission Guidelines

Papers will be evaluated based on their originality, presentation, relevance and contribution to the topic associated to the special issue, and for 
their overall quality. The submitted papers have to describe original research which has not been published nor currently under review by other 
journals or conferences. Guest editors will make an initial determination of the suitability and scope of all submissions.  Papers that either lack 
originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and authors will be promptly informed 
in such cases.

Author guidelines for preparation of manuscript can be found at

Papers should be submitted via the EES application that can be found at

To ensure that all manuscripts are correctly identified for inclusion into the special issue, it is important that authors select SI-sec4 when they 
reach the “Article Type” step in the submission process.


Manuscript Due: September 30, 2014 (Extended deadline)
First Round of Reviews: November 31, 2014
Second Round of Reviews: January 15, 2015
Acceptance of Final papers: February 15, 2015
Final Manuscript Due: March 15, 2015
Publication Date: October 2015

Guest Editors

Joaquin Garcia-Alfaro
Institut Mines-Telecom, Telecom SudParis, France
Email: [log in to unmask]

Francesco Longo
University of Calabria, Italy
Email: [log in to unmask]

Gregorio Martinez Perez
University of Murcia, Spain
Email: [log in to unmask]

Gregorio Martinez, PhD
University of Murcia, Spain

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see