September 9th 2014, Firenze, Italy
The Workshop will be held at “Palazzo Coppini – Beglaryan room”, Via del Giglio, 10 – Florence
This workshop aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products in the area of reliable, dependable and secure computing for critical systems protection from both a theoretical and practical perspective. Its ultimate goal is to envision new trends and ideas about as- pects of designing, implementing, and evaluating reliable and secure solutions for the next generation critical infrastructures. Critical Infrastructures present several challenges in the fields of distributed systems, dependability and security methods and approaches crucial for improving trustworthiness on ICT facilities. The workshop aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main infrastructures for modern society.
Topics of interest are (but not limited to):
- Model-based and experimental assessment of safety, reliability and security – Security & Privacy
- Quantitative analysis of dependability and security metrics
- Risk Assessment and Management
- Fault tolerant and Dependable Distributed Algorithm – Threat Analysis
- Monitoring systems
- Adaptive solutions for secure and safe systems
- Self-* solutions
Domains of application are (but not limited to):
- Critical infrastructure, Smart Grid, and SCADA systems – Medical device and healthcare
- Telecommunication and networks
- Railways, automotive, aerospace, and avionics
- Defence, cyber intelligence
Submitted papers must be written in English and each papers must contain results that have not previously appeared and have not been concurrently submitted to a journal or conference with published proceedings. In all cases, any partial overlap with any published or concurrently submitted paper must be clearly indicated. Submissions are limited to 10 pages in the LNCS format. Additional details maybe included in a clearly marked appendix that will be read at the discretion of the PC. Papers must be submitted electronically using the EasyChair server. The link is https://www.easychair.org/conferences/?conf=resa4ci.
The selection of contributions to be presented at the conference and published in the proceedings will be based on peer-review by the Programme Committee. Accepted paper will be published in the Springer’s Lecture Notes in Computer Science series jointly with the SAFECOMP 2014 proceedings. It is required that each accepted paper be presented at the workshop by one of its authors. Authors of accepted papers are required to submit the final, camera-ready versions of their papers (in LNCS format), including an electronic version as specified in the authors’ instructions.
|Acceptance notification:||June 20, 2014|
|Camera-ready copy due:||July 1, 2014|
|ReSA4CI’14 Workshop:||September 9, 2014|
|Silvia Bonomi||University of Rome La Sapienza, Italy|
|Ilaria Matteucci||IIT-CNR, Italy|
|Valentina Bonfiglio||University of Florence, Italy|
|Silvia Bonomi||University of Rome La Sapienza, Italy (co-chair)|
|Felicita Di Giandomenico||ISTI-CNR, Italy|
|Karama Kanoun||LAAS, France|
|Ilaria Matteucci||IIT-CNR, Italy (co-chair)|
|Alessia Milani||University of Bordeaux, France|
|Simin Nadjm-Tehrani||Linköping University, Sweden|
|Federica Paci||University of Trento, Italy|
|Marta Patino Martinez||Technical University of Madrid, Spain|
|Marinella Petrocchi||IIT-CNR, Italy|
|Maria Gradinariu Potop-Butucaru||UPMC Paris 6, France|
|Sara Tucci Piergiovanni||CEA, France|
|Luca Montanari, Roberto Baldoni, Claudio Ciccotelli, Federico Lombardi, Alessandro Donno and Adriano Cerocchi.
Towards a non-Intrusive Recognition of Anomalous System Behavior in Data Centers
|Paolo Franchin and Luigi Laura.
Probabilistic inference in the physical simulation of interdependent critical infrastructure systems
|Peter Popov, Kizito Salako and Oleksandr Netkachev.
Quantification of the Impact of Cyber Attack in Critical Infrastructures
|Cesario Di Sarno and Alessia Garofalo.
Energy-Based Detection of Multi-Layer Flooding Attacks on Wireless Sensor Network
|Richard M. Zahoransky, Thomas Koslowski and Rafael Accorsi.
Resilience Assessment in Business Process Architectures
|Laura Carnevali, Marco Paolieri, Fabio Tarani, Enrico Vicario and Kumiko Tadano.
Modeling and evaluation of maintenance procedures for gas distribution networks with time-dependent parameters
Camera Ready Information
The final version of accepted papers is due on July 1st.
The limit of 12 pages is strict and must include everything (figures, tables, references and appendix).
Detailed instruction will be sent to all corresponding authors.