Cybersecurity for Critical Infrastructure Systems (CCIS 2021)

This workshop, collocated with the 6th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2021)


Scope

With advances in various technological fields, critical infrastructures have been developed in many industries, e.g., communications, commercial facilities, critical manufacturing sector, defense, energy, food and agriculture, financial services, to just name a few. One of the major characteristics of these infrastructures is that they are all connected online, making them as cyber-physical systems. Although this connectivity improves their services, it also makes them vulnerable to complex security threats. The systems, networks and assets of these infrastructures, whether physical or virtual, are so vital that such threats would have a debilitating effect on their services and customers or even national security. As the recent cyberattacks on critical infrastructure become more sophisticated and increase exponentially, there is urgent need to leverage the latest advances in the domain of data science, game theory, machine learning and deep learning to develop cyber security solutions that can provide timely detection and rapid response to cyberattacks through real-time analysis. This workshop, collocated with the 6th IEEE International Conference on Data Science in Cyberspace (IEEE DSC2021), will solicit novel solutions for effective detection and prevention of zero-day attacks, APTs and other sophisticated cyberattacks for cyber-physical systems.


WORKSHOP AREAS

Topics of interest include but not limited to:

1.Machine learning techniques for cyber-physical systems (CPS) security 
2. Deep learning techniques for CPS security
3.Threat and vulnerability analysis for CPS  
4. Secure network architecture for CPS
5. Secure data management approaches for CPS
6. Cybersecurity prevention and response strategies for CPS
7. Cyberattacks prediction for CPS
8. Network forensics for CPS


PAPER SUBMISSION

All submissions should be written in English and submitted via our submission system: https://cmt3.research.microsoft.com/CCIS2021

A paper submitted to CCIS 2021 cannot be under review for any other conference or journal during the entire period that it is considered for CCIS 2021, and must be substantially different from any previously published work. Submissions are reviewed in a single-blind manner. Please note that all submissions must strictly adhere to the IEEE templates as provided below. The templates also act as a guideline regarding formatting. In particular, all submissions must use either the LATEX template or the MS-Word template. Please follow exactly the instructions below to ensure that your submission can ultimately be included in the proceedings. If you have any question on CCIS 2021, please feel free to contact Prof. Daojing He: [email protected]


IMPORTANT DATES

Full paper due: June 30, 2021, extend to July 15, 2021
Acceptance notification: July 30, 2021, extend to August 31, 2021
Camera-ready copy: August 15, 2021, extend to September 7, 2021
Conference Date: October 9-11, 2021

ORGANIZATION

WORKSHOP GENERAL CHAIR

Daojing HeHarbin Institute of Technology (Shenzhen), China 

WORKSHOP CO-CHAIR

Yong Ding, Guilin University of Electronic Technology, China
Sammy Chan,City University of Hong Kong, Hong Kong, China
Shui Yu, University of Technology Sydney, Australia

PROGRAM COMMITTEE

Chen Lin, School of Cyberspace Security, Chengdu University of Information Technology
Zhixiong Chen,School of Mathematics and finance,Putian University
Guoming Lai, SchooI of Computer Science and Engineering, Huizhou University.
Debiao He, School of Cyber Science and Engineering, Wuhan University.
Shichong Tan, School of Cyber Engineering, Xidian University
Guangxia Xu, School of Software Engineering, Chongqing University of Posts and Telecommunications
Zhang Xuefeng,School of cyberspace security, Xi'an university of posts and telecommunications.
Kai Lei, Peking University Shenzhen Graduate School
Weichao Wang, University of North Carolina Charlotte
Bing Xia, Froniter information technology research Institute, Zhongyuan University of Technology
Wei Gao, School of Information Science and Technology, Yunnan Normal University
Minghui Zheng, School of Information Engineering, Hubei Minzu University



footer