Call for Papers

Scope


Safety and security are at the heart of any country’s prosperity in the digital data and information age. Data and information protection is a critical aspect in digital or social, global and local interactions. In times of many conflicts around the world and economic instability, we are inundated with a whole lot of information that is very difficult to verify in a short period. Many examples can be given of such events related to the conflict in Ukraine or, more recently, Israel. The dissemination of fake news not only impacts military action but has a much broader scope and directly or indirectly affects the comfort of every European’s life. To keep citizens safe (and protected) in this new reality, national, regional and municipal authorities must take a comprehensive approach and cooperate across national borders. The digital society and business also require synchronization in operation and interaction regarding security and reliable interoperability.

 

Therefore, developing efficient, scalable, distributed ICT systems that provide efficient verification of data and information and ensure a viable level of security as they are exchanged and stored remains an ongoing challenge for researchers and specialists in various fields. Critical cyber-physical systems consist of multiple components and distributed digital infrastructure supporting people’s daily lives. Such systems can include all innovative projects - smart homes, intelligent transportation, smart cities, smart grids, fintech or e-health systems. Due to the collection and processing of sensitive data, security components and protocols are particularly important in the architectures of these systems, especially when using Internet sources and services.

 

This workshop primarily covers practical and theoretical approaches that advance research in security techniques, models and algorithms for digital society and digital business with high cyber resilience and anti-malware in complex distributed HPC systems, cloud computing, mobile nodes and cloud-connected Edge clusters. Contributions can range from advanced technologies, applications and innovative solutions for secure critical infrastructures with applications in various domains of life to the development of methods conceptual and theoretical models related to secure management, monitoring, planning and resource allocation in large-scale ICT systems. 



Topics include, but are not limited to, the following: