<html><head></head><body><div class="yahoo-style-wrap" style="font-family:verdana, helvetica, sans-serif;font-size:13px;"><div dir="ltr" data-setdir="false"><span><a href="http://staff.www.ltu.se/~ismawa/spcps/" rel="nofollow" target="_blank" class="">http://staff.www.ltu.se/~ismawa/spcps/</a> </span></div><div dir="ltr" data-setdir="false"><br></div><div dir="ltr" data-setdir="false"><div><h2 style="margin: 0px auto; text-align: justify; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"><font size="4" style="margin: 0px auto;">Call for Chapters</font></h2><h1 style="margin: 0px auto; text-align: justify; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"><font size="3" style="margin: 0px auto;">Security and Privacy in Cyber-Physical Systems: Threats and Defenses</font></h1><p style="margin: 0px auto; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"> </p><h2 style="margin: 0px auto; text-align: justify; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"><font size="2.5" style="margin: 0px auto;">Aims and Scope:</font></h2><font style="margin: 0px auto; text-align: justify; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"></font><span style="color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif; text-align: justify;"></span><p style="margin: 0px auto; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;"></p><div style="margin: 0px auto; text-align: justify; color: rgb(6, 28, 55); font-family: tahoma, Helvetica, sans-serif;">A Cyber-Physical System (CPS) is a compound blend of computer and physical components, in which physical systems are controlled and monitored by computer-based algorithms. Examples of CPS are many, and include, among others, eHealth and medical monitoring, autonomous driving systems, robotic systems, industrial control systems, and smart grid. CPS blur the lines between personal and infrastructural spaces and this blurring is engineered into the Internet of Things (IoT). In IoT, a CPS has gained enormous success in a huge range of distributed integration environments. Interconnected sensing devices in CPS, sense data from the surrounding and sends them, through the network, to the interested nodes. With the help of IoT, personal CPS such as appliances, and phones with personal data, can be made available into public infrastructures to access services. This might result in leakage of personal data. Moreover, guaranteeing basic security concepts like confidentiality, integrity, and availability is a major challenge owing to the loose coupling of the vendors, the service providers, and the end subscribers in a CPS chain.<p style="margin: 0px auto; text-align: left;"></p><div style="margin: 0px auto;"><br style="margin: 0px auto;">The design of an advanced CPS, integration of wireless sensor-actuator networks, belonging to independent stakeholders, is of utmost importance. Communication links, in such complex, heterogeneous systems, must meet stringent requirements concerning range, latency and throughput, while adhering to the constrained energy budget, and providing high levels of security. However, CPSs possess additional features that provide opportunities to adversaries that can cause havoc without corrupting or stealing the data. Simply varying the timing of key computations is enough to bring the system to a halt. Note that, for example, false data insertion to the control system may lead to destructive actions in plants. Cyberattacks might include manipulation of data, data theft, or denial of service. Cyber-based attack may cause damage to critical infrastructures that might significantly impact the economy, national security, and the safety and livelihood of many individual citizens.<p style="margin: 0px auto; text-align: left;"></p></div><p style="margin: 0px auto; text-align: left;"></p><div style="margin: 0px auto;"><br style="margin: 0px auto;">Great strides have been made in CPSs to improve the computing mechanisms, communication and quality of service, by applying optimization algorithms. Currently, these efforts are integrated with the applications of Machine Learning and Artificial Intelligence. Moreover, owing to its deployment in harsh environmental conditions, the consensus problem in these CPSs is a major concern and heavily affects the performance of consensus-based applications, such as blockchain, event detection, etc. Also, large number of existing IoT ecosystems utilize centralized servers and, therefore, face the single point failure problem. In this context, blockchain-based techniques propose privacy preserving models, capable of evading the single point failure problem and centralized trust issue.<p style="margin: 0px auto; text-align: left;"></p></div><p style="margin: 0px auto; text-align: left;"></p><div style="margin: 0px auto;"><br style="margin: 0px auto;">The goal of the proposed book is to foster transformative, multidisciplinary and novel approaches that ensure the CPSs security, by taking into consideration unique security challenges present in the environment. This book will attract contributions in all aspects pertaining to this multidisciplinary paradigm. Contributing authors will be expected to investigate state-of-the-art achievements, applications and research issues in the field of, broadly understood, security paradigms for CPS. The resulting book will provide comprehensive reviews of cutting–edge state-of-the-art algorithms, technologies, and applications, providing new insights into a range of fundamentally important topics in security and privacy of CPSs.<br style="margin: 0px auto;"><br style="margin: 0px auto;">Topics of interest include, but not limited to:<p style="margin: 0px auto; text-align: left;"></p></div><br style="margin: 0px auto;"><h3 style="margin: 0px auto;"><font size="2" style="margin: 0px auto;">Threat Identification and Modeling for Cyber-Physical Systems</font></h3><font size="2" style="margin: 0px auto;"></font><ul style="margin: 0px auto;"><li style="margin: 0px auto; text-align: justify;">Foundations of data security and privacy in CPSs</li><li style="margin: 0px auto; text-align: justify;">Vulnerability analysis and assessments for CPSs</li><li style="margin: 0px auto; text-align: justify;">Attacks and vulnerabilities detection in WSNs</li><li style="margin: 0px auto; text-align: justify;">Risk assessments and identification strategies</li><li style="margin: 0px auto; text-align: justify;">Human aspects in CPSs security and privacy</li><li style="margin: 0px auto; text-align: justify;">Attack pattern detection and prediction</li><li style="margin: 0px auto; text-align: justify;">Internet of Things (IoT) security threats</li><li style="margin: 0px auto; text-align: justify;">Industrial Control Systems threats</li></ul><h3 style="margin: 0px auto;"><font size="2" style="margin: 0px auto;">Security and Privacy Defense Mechanisms for Cyber-Physical Systems</font></h3><font size="2" style="margin: 0px auto;"></font><ul style="margin: 0px auto;"><li style="margin: 0px auto; text-align: justify;">CPS resilience</li><li style="margin: 0px auto; text-align: justify;">Architecture and frameworks for securing CPSs</li><li style="margin: 0px auto; text-align: justify;">Authentication and access control in CPSs</li><li style="margin: 0px auto; text-align: justify;">Cryptography and wireless security</li><li style="margin: 0px auto; text-align: justify;">Machine learning for fostering security in CPSs</li><li style="margin: 0px auto; text-align: justify;">Blockchains and their applications</li><li style="margin: 0px auto; text-align: justify;">Secure IoT Communication using blockchain</li><li style="margin: 0px auto; text-align: justify;">Socio-technical defenses for security and privacy</li><li style="margin: 0px auto; text-align: justify;">Smart IDS and IPS designed for different CPSs</li></ul><p style="margin: 0px auto; text-align: left;"> </p><h2 style="margin: 0px auto;"><font size="2.5" style="margin: 0px auto;">Publication Schedule:</font></h2><font size="2.5" style="margin: 0px auto;"></font>The tentative schedule of the book publication is as follows:<ul style="margin: 0px auto;"><li style="margin: 0px auto; text-align: justify;">Deadline for chapter proposal submission: <b style="margin: 0px auto;">October 01, 2019</b></li><li style="margin: 0px auto; text-align: justify;">Author notification for chapter proposal: <b style="margin: 0px auto;">October 15, 2019</b></li><li style="margin: 0px auto; text-align: justify;">Deadline for full chapter submission: <b style="margin: 0px auto;">April 15, 2020</b></li><li style="margin: 0px auto; text-align: justify;">Author notification: <b style="margin: 0px auto;">June 01, 2020</b></li><b style="margin: 0px auto;"></b><li style="margin: 0px auto; text-align: justify;">Camera-ready submission: <b style="margin: 0px auto;">July 15, 2020</b></li><b style="margin: 0px auto;"></b><li style="margin: 0px auto; text-align: justify;">Planned publication schedule: <b style="margin: 0px auto;">Fourth quarter of 2020</b></li><b style="margin: 0px auto;"></b></ul><p style="margin: 0px auto; text-align: left;"> </p><h2 style="margin: 0px auto;"><font size="2.5" style="margin: 0px auto;">Submission Procedure:</font></h2><font size="2.5" style="margin: 0px auto;"></font><p style="margin: 0px auto; text-align: left;"></p><div style="margin: 0px auto;">Authors are invited to submit original, high quality, unpublished results of A Cyber-Physical System (CPS) security and privacy. Submitted manuscripts should conform to the author’s guidelines of the Springer's chapter format mentioned in the right panel of the Studies in Systems, Decision and Control (SSDC) homepage <a href="https://www.springer.com/series/13304" style="margin: 0px auto;" rel="nofollow" target="_blank" class="">(Link)</a>. Submitted chapters should be prepared using Latex or Microsoft Word, and according to the Springer's chapter templates that can be downloaded from the aforementioned website.<br style="margin: 0px auto;"><br style="margin: 0px auto;">Prospective authors need to electronically submit their contributions using EasyChair submission system <a href="https://easychair.org/conferences/?conf=spcps2020" style="margin: 0px auto;" rel="nofollow" target="_blank">(<b style="margin: 0px auto;">Link</b>)</a>. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published as a volume in the prestigious "Studies in Systems, Decision and Control" series by Springer. More information about the "Studies in Systems, Decision and Control" series and the author instructions can be found in the <a href="https://www.springer.com/series/13304" style="margin: 0px auto;" rel="nofollow" target="_blank">(<b style="margin: 0px auto;">Link</b>)</a>.<p style="margin: 0px auto; text-align: left;"></p></div><div><br></div><div><br></div><h2 style="margin: 0px auto;"><font size="2.5" style="margin: 0px auto;">Indexing:</font></h2>For details on indexing of the series, please refer to SSDC website <a href="https://www.springer.com/series/13304" style="margin: 0px auto;" rel="nofollow" target="_blank">(<b style="margin: 0px auto;">Link</b>)</a>.<p style="margin: 0px auto; text-align: left;"> </p><h2 style="margin: 0px auto;"><font size="2.5" style="margin: 0px auto;">Volume Editors:</font></h2><b style="margin: 0px auto;">Dr.: Ali Ismail Awad </b>(<a href="https://www.researchgate.net/profile/Ali_Awad3" style="margin: 0px auto;" rel="nofollow" target="_blank">ResearchGate</a>, <a href="https://scholar.google.se/citations?user=-JinZTsAAAAJ&hl=en" style="margin: 0px auto;" rel="nofollow" target="_blank" class="">Google Scholar)</a><br style="margin: 0px auto;">Department of Computer Science, Electrical and Space Engineering<br style="margin: 0px auto;">Luleå University of Technology<br style="margin: 0px auto;">Luleå, Sweden<br style="margin: 0px auto;">E-mail: ali.awad[at]ltu.se<br style="margin: 0px auto;"><p style="margin: 0px auto; text-align: left;"> </p><b style="margin: 0px auto;">Prof.: Steven Furnell</b> (<a href="https://www.researchgate.net/profile/Steven_Furnell" style="margin: 0px auto;" rel="nofollow" target="_blank">ResearchGate</a>, <a href="https://scholar.google.com/citations?user=Wp9EpxAAAAAJ&hl=en" style="margin: 0px auto;" rel="nofollow" target="_blank">Google Scholar)</a><br style="margin: 0px auto;">Faculty of Science and Engineering<br style="margin: 0px auto;">University of Plymouth<br style="margin: 0px auto;">Plymouth, United Kingdom<br style="margin: 0px auto;">E-mail: S.Furnell[at]plymouth.ac.uk<br style="margin: 0px auto;"><p style="margin: 0px auto; text-align: left;"> </p><b style="margin: 0px auto;">Dr.: Marcin Paprzycki</b> (<a href="https://www.researchgate.net/profile/Marcin_Paprzycki" style="margin: 0px auto;" rel="nofollow" target="_blank" class="">ResearchGate</a>, <a href="https://scholar.google.com/citations?user=OWSryNQAAAAJ&hl=en" style="margin: 0px auto;" rel="nofollow" target="_blank">Google Scholar)</a><br style="margin: 0px auto;">Systems Research Institute<br style="margin: 0px auto;">Polish Academy of Sciences<br style="margin: 0px auto;">Warszawa, Poland<br style="margin: 0px auto;">E-mail: paprzyck[at]ibspan.waw.pl<br style="margin: 0px auto;"><p style="margin: 0px auto; text-align: left;"> </p><b style="margin: 0px auto;">Prof.: Sudhir Kumar Sharma</b> (<a href="https://scholar.google.com/citations?user=QH2DXg4AAAAJ&hl=en" style="margin: 0px auto;" rel="nofollow" target="_blank">Google Scholar)</a><br style="margin: 0px auto;">Institute of Information Technology and Management<br style="margin: 0px auto;">New Delhi, India<br style="margin: 0px auto;">E-mail: sharmasudhir08[at]gmail.com</div><div>========================================================================================</div></div><br></div></div></body></html>