CCNI 2024

 

Cybersecurity of Critical National Infrastructures

 

Workshop co-organized with IEEE WOWMOM 2024 https://www.cse.unsw.edu.au/~wowmom/2024/index.html

4–7 June 2024 // Perth, Australia

Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare, and the national security of countries. Vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As CNIs are becoming more vulnerable to cyberattacks, their protection becomes a significant issue for any organization as well as nation. The risks to continued operations from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes are considered higher given the demonstrable impact of such circumstances.

 

Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of CNIs has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioral aspects is essential to handle cyber security effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace.

 

In this workshop, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry are welcome to contribute.

We seek original and high-quality submissions on, but not limited to, one or more of the following topics:


§ Cyber security of industrial control systems;

§ Cyber security modeling and simulation;

§ Cyber security of complex and distributed critical infrastructures;

§ Cyber threat modeling and analysis;

§ Safety-security interactions;

§ Behavioral modeling;

§ Network security and protocols;

§ Security, privacy, and legal issues of big data and the Internet of Things;

§ Cyber threat intelligence;

§ Situational awareness;

§ Attack modeling, prevention, mitigation, and defense;

§ Critical infrastructure security policies, standards and regulations;

§ Vulnerability and risk assessment methodologies for distributed critical infrastructures;

§ Risk management and cyber insurance;

§ Simulation and test beds for the security evaluation of critical infrastructures;

§ Resiliency and security of cyber systems;

§ Cyber security and privacy policy;

§ Hardware security solutions;

§ Incident response;

§ Encryption, authentication, availability assurance;

§ Human awareness and training;

§ Intrusion detection;

§ Trust and privacy;

§ Secure communication protocols;

§ Malware analysis;

§ Blockchain and ZKPs

 

Important Deadlines

Full Paper Submission: March 8, 2024

Notification of Authors: March 31, 2024



REGULAR PAPERS

Regular papers submissions may be up to 10 pages in length (including figures and references), formatted in two-column IEEE conference style with font size 10 points or greater. See IEEE Manuscript Templates for Conference Proceedings.

WORK IN PROGRESS PAPERS

WIP (Work-in-progress) papers provide a peer-reviewed forum for late-breaking or preliminary research results, giving an opportunity for researchers and practitioners to present and demonstrate their recent research and obtain feedback from their peers in a poster session. Work-in-progress papers submissions may be up to 4 pages in length (including figures and references) and must have the prefix "WIP:" in the paper's title.


LIST OF ACCEPTED PAPERS

1. WIP: Performance Metrics of PUF-Based Authentication Protocols for Smart Grid: A Review, Taylah J Griffiths, Mohiuddin Ahmed and Shihao Yan (Edith Cowan University, Australia)

2. Enhancing Cybersecurity Training Efficacy: A Comprehensive Analysis of Gamified Learning, Behavioral Strategies and Digital Twins, Yagmur Yigit (Edinburgh Napier University, United Kingdom (Great Britain)); Kitty Kitty Kioskli (University of Essex, United Kingdom (Great Britain)); Laura May Bishop (Cardiff University, France); Nestoras Chouliaras (University of West Attica, Greece); Leandros A. Maglaras (Edinburgh Napier University, United Kingdom (Great Britain)); Helge Janicke (Edith Cowan University, Australia

3. An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management,  Habib EL Amin (Lebanese University & Saint Joseph University, Lebanon); Abed Ellatif Samhat (Lebanese University, Lebanon); Maroun Chamoun (Université Saint Joseph, Lebanon); Lina Oueidat (Lebanese University, Lebanon); Antoine Feghali (Potech Labs, Lebanon)

4. Survey and Experimentation to Compare IoT Device Model Identification Methods, Norihiro Okui (KDDI Research, Inc., Japan); Masataka Nakahara (KDDI Research, Japan); Ayumu Kubota (KDDI Research Inc., Japan)

5. Preserving Data Integrity and Detecting Toxic Recordings in Machine Learning Using Blockchain, Bechir Alaya (LITIS - Université du Havre, France); Tarek Moulahi (Université de Haute-Alsace, France); Salim El khediri (College of Computer & Qassim University, Saudi Arabia); Suliman Aladhadh (Qassim University, Saudi Arabia)


Workshop Chairs

Leandros Maglaras, Edinburgh Napier University, UK

Leandros Tassiulas, University of Yale, USA

TPC Chairs
Bill Buchanan, Edinburgh Napier University, UK

Helge Janicke, Edith Cowan University, Australia 

 

Publicity Chairs

Berk Canberk, Edinburgh Napier University, UK

Mohamed Amine Ferrag, TII, UAE

Kitty Kioskli, trustulio, NL

Yagmur Yigit, Edinburgh Napier University, UK

  

Technical Program Committee

Christos Chrysoulas, Edinburgh Napier University, UK
Simon Parkinson, University of Huddersfield, UK 

Tiago Cruz, University of Coimbra, Portugal

Vasileios Gkioulos, Norwegian University of Science and Technology, NO
Naghmeh Moradpoor, Edinburgh Napier University, UK

Iqbal H. Sarker, Edith Cowan University, AUS

Yagmur Yigit, Edinburgh Napier University, UK

Kubra Duran, Edinburgh Napier University, UK

Ioanna Kantzavelou, University of West Attica, Greece