Call for Papers
CRITIS 2022 continues the tradition of bringing forth innovative research in the field of critical information infrastructures protection C(I)IP, exploring ideas that address challenges to resilience and societal safety & security, and fostering dialogue with stakeholders.
This year, papers focusing on complex safety & security, digital twins, technology forecasting, monitoring, foresight, scouting for C(I)IP are most welcome in a special TechWatch & TechForecast track. Moreover, CRITIS 2022 will also focus on the impact of the COVID-19 pandemic on C(I)IP. Papers, testbeds, datasets reports, industrial/practical experience reports on that crisis are specially welcome.
CRITIS 2022 topics include (but are not limited to):
Topic 1: Protection of Cyber-Physical Systems and Industrial Control Systems
- Control Towers and Intelligent Reachback Systems
- Protection of industrial installations and industrial control systems (ICS), such as: supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), remote terminal units (RTU) and programmable logic controllers (PLC)
- Vulnerability and risk analysis / threat modelling
- Cyber-security in C(I)I systems and embedded systems (e.g. SMART instrumentation)
- Self-healing, self-protection, and self-management architectures for C(I)I
- Fault-tolerant control for cyber-physical systems in C(I)I
- Modelling and analysis of cyber-physical systems in C(I)I
- Exploration of the privacy / utility trade-off in C(I)IP
- Distributed privacy-preserving cyber threat intelligence sharing platform for C(I)I (e.g., MISP, TheHive, Cortex, OpenCTI, etc.)
- New developments in security operations center (SOC)
Topic 2: Analytics, Strategic Management, (C(I)IP Organisation)
- Operational technology (OT) security
- Standards and frameworks for improving critical infrastructure cybersecurity (e.g., NIST, ISO/IEC 27001 & 22301, Cobit, ITIL, etc.)
- Cross-border issues regarding the Network and Information Security (NIS) Directive
- Security information sharing for C(I)IP and information sharing and analysis centers (ISACs)
- C(I)IP policies at international, national and cross-border levels (e.g., public-private partnerships)
- Economics, investments and incentives for C(I)IP
- Digital forensics and attack attribution in the context of C(I)I
- International approaches to C(I)IP including identification of C(I)I elements
- Risk management, impact and consequence analysis regarding C(I)I
- Coherent prevention, preparedness / exercises, incident management / mitigation, and recovery approaches to C(I)I
- Resilience and survivability of C(I)I as complex cyber-physical systems
- R&D agenda at national and international levels for C(I)IP
- Defence of civilian C(I)I in conflicts with cyber-warfare elements
- Infrastructure, architectural and technology changes impacting C(I)I-sectors (e.g., smart grids and energy supply in smart-city developments)
Topic 3: Security Awareness and Crisis Management for C(I)IP, Human Factors and Critical Services
- Analysis of human factor and security awareness in C(I)IP
- Impact of the COVID-19 pandemic on C(I)IP
- Impact of geopolitical and social factors on C(I)IP
- Advanced decision support for mitigating C(I)I related emergencies
- Social aspects and public communication in C(I)IP
- Psycho-social dimensions of crisis management and intervention with C(I)I
- Training for C(I)IP and effective intervention
- The role of social-medias in C(I)I-related crisis management (as a threat or a benefit)
- Recent trends in cyber-economy (clouds, quasi-monopolies, e-currencies, etc.)
and implications for C(I)IP - Supply chain cyber-attack and C(I)IP
Topic 4: Future, TechWatch & Forecast for C(I)IP and Services Oriented Approaches, Explainable AI and Digital Twins
- Technology forecasting, monitoring, foresight, scouting,
horizon scanning for C(I)IP and critical services - Production-capability networks, innovation structures and dynamics underlying the technology lifecycle for C(I)IP
- Modelling portfolios of emerging and/or disruptive technologies related to C(I)IP
- Applying real-option models to capture the net-present value of uncertain innovation portfolios for C(I)IP
- New platforms for financing and data management (e.g., blockchains)
- New Internet architectures, IoT infrastructure and emerging standards
- Artificial intelligence (AI) and machine learning for autonomous management of C(I)I
(e.g., anomaly detection) - New communication technologies (e.g., 5G) and their potential impact on C(I)I
- Digital twins and their deployment as augmented reality for training and scenario-risk analysis
Topic 5: Safety & Security: Complex Vulnerability Analysis
- Railway Safety
- Transport and Logistic Security
- Maritime Security
- Energy Security
Topic 6: Intelligence Analysis & Quantum Intelligence
- Attacker-Defender Scenarios
- Quantum Computing
- Reinforcement Learning
- Data Driven Optimization
- Intelligence Automation
- Small and Big Data Approaches in Intelligence Analysis
- OR-Based Intelligence Analysis
Topic 7: Legal Aspects and Ethical Perspectives
- Complexity of Cyber Physical Systems
- Philosophical Reflections
Paper Submission & Guidelines
All submissions are made through EasyChair (please only use this link for submission). As per tradition, post-proceedings will be published in Springer Lecture Notes in Computer Science (LNCS).
Regular paper submission guidelines
The following two paper categories are welcome. Any submission needs to be explicitly marked as
“full paper” or “short paper”.
- Full papers – scientific research papers, surveying works and industrial experiences describing significant advances in C(I)IP. Papers should be no longer than 20 pages, including bibliography and well‐marked appendices.
- Short papers – early results or work in progress with initial findings. Papers should be 4 to 6 pages long, including bibliography and well‐marked appendices.
All papers must be original and not simultaneously submitted to another journal or conference. All paper submissions must contain a title, a short abstract, and a list of keywords. All submissions will be subjected to a thorough double‐blind review by at least three reviewers. Submitted papers shall be anonymised and all author names, affiliations, acknowledgements, and obvious traceable references should be eliminated to be eligible for the review process.
Submission
Submitted manuscripts should represent significant and novel research contributions.
All manuscripts will have to be submitted in anonymized form for double-blind review. (See https://cacm.acm.org/magazines/2018/6/228027-effectiveness-of-anonymization-in-double-blind-review/abstract for arguments substantiating this change.)
To that effect:
- The title page should not contain any author names or affiliations.
- Authors should carefully review figures and appendices (especially survey instruments) to ensure affiliations are not accidentally included.
- When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible.
- Authors may include links to websites that contain source code, tools, or other supplemental material. Neither the link in the paper nor the website or any of the materials therein may contain the authors’ names and affiliations.
Papers that are not properly anonymized may be rejected without review.
While submitted papers must be anonymous, authors may choose to give talks about their work, post a preprint of the paper online, disclose security vulnerabilities to vendors or the public, etc. during the review process.
Submissions should be made according to the Springer LNCS format (LaTeX template, Word template). For optimisation reasons, authors are strongly encouraged to use the following LaTeX Proceedings Templates available in the scientific authoring platform Overleaf. Kindly note that we prefer the use of American English. Maximum length of text abstracts: 180 words.
For detailed guidelines, please refer to the official Guidelines for Authors of Papers to be Published in Springer Computer Science Proceedings (pdf).
Industrial/practical experience reports and testbeds/datasets reports submission guidelines
The submissions in these sessions have the following characteristics:
- Papers of up to 2 pages in length (including references and figures), using the Springer format;
- The submissions are NOT anonymised;
- The title of the submission must include the words “Industrial/Practical Experience report” OR “Testbeds/Datasets report.
Submissions should be made according to the Springer LNCS format (LaTeX template, Word template). For optimisation reasons, authors are strongly encouraged to use the Springer’s LaTeX template available directly in Overleaf. Kindly note that we prefer the use of American English. Maximum length of text abstracts: 180 words.