Topics

The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, security models, security mechanisms, and privacy-enhancing technologies. The authors are invited to submit research results as well as practical experiments or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., industrial control systems, digital manufacturing, intelligent transportation systems, connected vehicles, critical infrastructures, telemedicine, banking, e-government, e-learning, e-commerce, mobile networks, embedded applications, etc.).

The list of topics includes but is not limited to:

  • AI and machine learning-based security approaches
  • Analysis and management of risk
  • Attacks and defenses
  • Attack data acquisition and network monitoring
  • Authorization, Authentication and Identity Management
  • Cryptography, biometrics, watermarking
  • Dependability and fault tolerance of Internet applications
  • Distributed systems security and safety
  • Embedded system security and safety
  • Empirical methods for security and risk evaluation
  • Hardware-based security and physical security
  • Intrusion detection and prevention systems
  • Organizational, ethical and legal issues
  • Privacy protection and anonymization
  • Risk-aware access and usage control
  • Security and risk assessment
  • Security and risks metrics
  • Security and dependability of operating systems
  • Security and safety of critical infrastructures
  • Security and privacy of the peer-to-peer system
  • Security and privacy of wireless networks
  • Security in Cloud/Edge/Fog computing
  • Security models and security policies
  • Security of big data
  • Security of industrial control systems
  • Security of intelligent transportation systems
  • Security of e-commerce, electronic voting and database systems
  • Security of new generation networks
  • Security of smart cities
  • Security of smart grid
  • Security of social networks
  • Security of the IoT and IIoT
  • Security of VoIP and multimedia
  • Smartphone security and privacy
  • Traceability, metrology, and forensics
  • Trust management
  • Ubiquitous computing security
  • Use of smart cards and personal devices for Internet applications
  • Virtualization security
  • Web and Web-service security

Paper submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be written in English and must be submitted electronically in PDF format.

The papers that will be selected for presentation at the conference will be included in post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series (prior to publication the papers should be revised according to the review comments). Pre-proceedings will appear at the time of the conference.

Maximum paper length will be 16 printed pages for full papers or 6 pages for short papers, in LNCS style (http://www.springer.de/comp/lncs/authors.html). Authors of accepted papers must guarantee that their papers will be presented at the conference. All paper submissions will be handled through the Easy Chair conference management system: https://easychair.org/conferences/?conf=crisis2020.