WCICSS. World Congress on Industrial Control Systems Security

 

2016

London Pictures

 

World Congress on Industrial Control Systems Security (WCICSS-2016)

December 12-14, 2016, London, UK

Free Post-Conference London Tour (Travel Information)


 

Notification and Preliminary Call for Papers

The World Congress on Industrial Control Systems Security (WCICSS) is Technical Co-Sponsored by IEEE UK/RI Computer Chapter. The WCICSS-2016 is a meeting point for professionals and researchers, IT security professionals, managers, developers, educators, vendors and service providers who are involved in development, integration, assessment, implementation, and operation of industrial cybersecurity technologies. Therefore, the conference will provide opportunities to discuss both the current status and emerging trends in protection of industrial control systems.

The objectives of the WCICSS are to bridge the knowledge gap between academia and industry, promote research esteem in Industrial Control Systems Security and the importance of Intelligent Control Applications. The WCICSS-2016 invites research papers that encompass conceptual analysis, design implementation and performance evaluation. The WCICSS-2016 theme is Cyber Security.

The topics in WCICSS-2016 include but are not confined to the following areas:

Advanced Applications

  • Advanced Control Algorithms and Applications
  • Artificial Intelligence and Knowledge Engineering
  • Advanced Robotic Systems
  • Application of Security Content Application Protocol (SCAP) in Industrial Environments

High Assurance Security Controls

  • Baseline and High Assurance Security Controls for ICS and SCADA Security
  • Best Practices in Building and Securing Industrial Control Systems

Control Theory and Engineering

  • Control Theory
  • Control System Cybersecurity
  • Control Systems Security Assessments and Audits
  • Control Theory and Applications
  • Critical Infrastructure Cybersecurity
  • Computational Intelligence and Applications
  • Communications and Network Protocol Security in Control Systems
  • Custom tools, Commercial of-the-shelf (COTS) and Government off-the-shelf (GOTS) Solutions for Automation of ICS Security Management

Defensive Architectures for Cybersecurity of Safety Systems

  • Cyber Security Defense Techniques
  • Cyber Security in Oil and Gas Industry
  • Cyber Security Risks to SCADA and ICS Systems
  • Cyber Attacks on Industrial Controls Systems
  • Cyber Physical Systems and Sensor Networks
  • Emerging Cybersecurity Technologies for ICS and SCADA Systems
  • Energy Grid Control System Cybersecurity
  • Lessons Learned in ICS and SCADA Cybersecurity
  • Legal, Regulatory and Contractual requirements on ICS and SCADA Security
  • Lifecycle Approaches to ICS and SCADA Cybersecurity
  • Logistics and Supply Chain Optimization

Engineering Optimization

  • Optimization for Industrial Automation Systems
  • Optimization for Decision Making Systems
  • Intelligent Optimization and Applications

Intelligent Control Theory and Applications

  • ICS Cybersecurity Education and Research
  • ICS, PLC, and SCADA Exploit Analysis
  • ICS and SCADA Fuzzing
  • ICS and SCADA Security Modelling
  • ICS and SCADA Security Metrics
  • ICS Security Standardization and Best Practices
  • ICS Software Security Assurance
  • ICS System Vulnerabilities, Attacks Surface, and Attack Vectors
  • ICS Security-By-Design
  • Image Processing
  • IT Risk Assessment
  • Risk Management in Industrial Environments
  • Intelligent Automation Systems for Manufacturing
  • Integrated Automation Systems
  • Intelligent Transportation Systems
  • Machine Learning
  • Robotics and Artificial Intelligence
  • Robotics and Biomimetics
  • Pattern Recognition

Networked Control Systems

  • Neurocomputing
  • Nonlinear Systems and Control
  • NANO, MEMS and Mechatronics Systems
  • Sensor Networks

Network Segmentation and Reliability

  • Architecture Design
  • Securing Remote Access
  • Security Convergence
  • ICS Risk Management

Robust Adaptive Control and SCADA

  • Social Robotics
  • Safety and Cybersecurity in Nuclear Power Plant Environments
  • Security Control overlays for ICS and SCADA Systems
  • Smart Grid Cybersecurity
  • Social Engineering and Insider Threat in Critical Infrastructures
  • Secure ICS and SCADA Architectures and Protocols
  • Security patch Management in ICS and SCADA Systems
  • Security of Sensor and Telemetry devices in Control Environments
  • Security Analysis and Scoring Systems
  • Security Event Management
  • System Modelling and Parameter Estimation
  • System Sensing, Modelling and Analysis
  • System Simulation
  • Need to protect Industrial Control Systems from Cyber-Attacks
  • Real World SCADA Security Incidents and Disasters
  • SCADA Security – Current Trends
  • Understanding Common Vulnerabilities in Industrial Control Systems
  • Analyzing Threats to SCADA Systems
  • Assessing and managing SCADA Risks
  • Designing  Comprehensive  SCADA Security Program
  • SCADA Security Standards
  • Essential SCADA Cybersecurity Controls and Countermeasures
  • SCADA Security Controls – Best Practices

Fault Diagnosis and Safe Operation

  • Measurement Methods and Intelligent Instrumentation
  • Online Monitoring for Systems
  • Tools for Security Assessments of Control Systems
  • Technologies for Aggregation and Analysis of Security Events
  • Technologies for enabling ICS
  • Cybersecurity Continuous Monitoring Program
  • Sensors, Sensing and Signal Processing
  • Vulnerability Management in Controls Systems
  • PLC and RTU Security and Vulnerability Assessments
  • Protection of Critical Infrastructure against Persistent Threats and Sophisticated Targeted Attacks
  • Governance and Management aspects of ICS and SCADA Security

Data Automation

  • Big Data Analysis and Visualization
  • Data-Driven Control
  • Data-Driven Diagnosis
  • Data-Driven Optimization, Scheduling, and Decision Making
  • Data-Driven Operations and Quality Control
  • Data-Based System Performance Analysis
  • ACTA Automatica Sinica

Network and Perimeter Security

  • Systems and Server Security
  • Malware Protection
  • Authentication and Access Control
  • Data and Communications Security
  • Vulnerability Assessment
  • Security Incident Management
  • Security Configuration and Patch Management
  • Personnel Security
  • Security Assessment and Audits

Research in Progress

  • Ongoing Research from Undergraduates, Graduates/Postgraduates and Professionals
  • Collaborative Research
  • Future Technologies
  • New Trends and Experiences

The WCICSS is an international refereed conference dedicated to the advancement of the theory and practices of Industrial Controls Security and SCADA.

Panel Discussion

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

The proposal must include:

  • Title
  • Panel Chair(s) (if necessary)
  • Speakers Name, Affiliation and Email
  • Scope
  • Objective and motivation

The WCICS-2016 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 30, 2016. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WCICS-2016, please email your proposal to the pandis@wcicss.org. Submissions should be in MS Word format.

Virtual Presentations

We understand that some presenters will not be able to make the trip to Canada to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. The WCICSS-2016 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers via email to papersubmission@wcicss.org

 

Sessions Speakers Participation

The WCICSS-2016 invites speakers to share their knowledge on issues or subject matters of the research work. To be a session speaker, you need to email:

  • Presentation Title
  • Scope (300 words)
  • Objective and Motivation (200 words)
  • Name, Affiliation and Emai

If you are interested in giving a talk without submitting a paper, please email your proposal to the speakers@wcicss.org The proposal will be reviewed by the Steering Committees. After acceptance, you will receive a feedback on any modification required. All accepted proposals will be published in the proceedings.

Notes:
• The panel discussion members and session speakers are responsible for meeting the costs of their registration, travel and accommodation.

 

WE HAVE ONLY 100

2 FOR 1 DISCOUNTED  REGISTRATION TICKETS

 

WCICSS-2016
theme is Cyber Security

 


2016

 

The WCICSS promotes

collaborative excellence between academicians and the industries...!

 

In Co-operation with


Infonomics Society


Canadian Teacher Magazine


IET


IET


IET
The Institution of Analysts and Programmers


IET


Canadian Teacher Magazine

 

Journal Publication

All the accepted papers will appear in
the proceedings and modified version
of selected papers will be published in special issues peer reviewed journals.

 

IJICSS

 

Organisation Sponship

Can your organisation sponsorWCICSS? If YES, contact us
and your organisation active logo will be display on this window!

 

Subscribe for WCICS Newsletter


Join the World's Leading Brands

Dropbox Logo
Microsoft Logo
Microsoft Logo
Apple Logo
IBM Logo
Intel Logo
Intel Logo
Google Logo
Facebook Logo
Twitter Logo

 

Who should attend the WCICSS?

  • Educators and researchers who are working in the areas of IT, ICS, and SCADA security.
  • Professionals and researchers responsible for security governance of industrial processes supported by ICS and SCADA systems.
  • Information and IT security Professionals and researchers in organizations that deploy industrial control systems, compliance of ICS and SCADA systems with the cybersecurity standards and guidelines.
  • Developers of cybersecurity standards and guidelines for a company, national and international levels.
  • The ICS and SCADA engineers, technicians, IT security professionals, IT management, plant managers, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.

Copyright © WCICSS Privacy Policy