<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin-top:0cm;
margin-right:0cm;
margin-bottom:8.0pt;
margin-left:0cm;
line-height:105%;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:376972189;
mso-list-type:hybrid;
mso-list-template-ids:-816402066 69140481 69140483 69140485 69140481 69140483 69140485 69140481 69140483 69140485;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="TR" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<div style="mso-element:para-border-div;border:none;border-bottom:double windowtext 2.25pt;padding:0cm 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><a name="_Hlk156917786"><b><o:p> </o:p></b></a></p>
</div>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">We apologize if you receive multiple copies of this CFPs.<o:p></o:p></span></p>
<div style="mso-element:para-border-div;border:none;border-bottom:double windowtext 2.25pt;padding:0cm 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk156917786">We appreciate your help to contribute & forward this CFPs to your friends.<o:p></o:p></span></p>
</div>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk156917786">You are cordially invited to submit your latest research results to the CCNI 2024 Workshop. <o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk156917786"><b>CALL FOR PAPERS<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Cybersecurity of Critical National Infrastructures Workshop co-organized with IEEE WOWMOM 2024,
<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>4–7 June 2024 // Perth, Australia<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Workshop Website:</b>
</span><a href="https://sites.google.com/view/ccni-2024/main?authuser=0"><span style="mso-bookmark:_Hlk156917786">https://sites.google.com/view/ccni-2024/main?authuser=0</span><span style="mso-bookmark:_Hlk156917786"></span></a><span style="mso-bookmark:_Hlk156917786"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Conference Website:</b>
</span><a href="https://www.cse.unsw.edu.au/~wowmom/2024/index.html"><span style="mso-bookmark:_Hlk156917786">https://www.cse.unsw.edu.au/~wowmom/2024/index.html</span><span style="mso-bookmark:_Hlk156917786"></span></a><span style="mso-bookmark:_Hlk156917786"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b><span style="color:#C00000">SUBMISSION DEADLINE: March 1, 2024<o:p></o:p></span></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>SUBMISSION LINK:</b>
</span><a href="https://edas.info/N31888"><span style="mso-bookmark:_Hlk156917786">https://edas.info/N31888</span><span style="mso-bookmark:_Hlk156917786"></span></a><span style="mso-bookmark:_Hlk156917786"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare, and the national security of countries. Vulnerabilities of critical infrastructures have increased with
the widespread use of information technologies. As CNIs are becoming more vulnerable to cyberattacks, their protection becomes a significant issue for any organization as well as nation. The risks to continued operations from failing to upgrade aging infrastructure
or not meeting mandated regulatory regimes are considered higher given the demonstrable impact of such circumstances.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of CNIs has become an agenda item for academics,
practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioral aspects is essential to handle cyber security effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity
in cyberspace.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">In this workshop, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of cyber security, authors
from academia, government, and industry are welcome to contribute.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">We seek original and high-quality submissions on, but not limited to, one or more of the following topics:<o:p></o:p></span></p>
<ul style="margin-top:0cm" type="disc">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber security of industrial control systems;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber security modeling and simulation;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber security of complex and distributed critical infrastructures;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber threat modeling and analysis;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Safety-security interactions;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Behavioral modeling;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Network security and protocols;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Security, privacy, and legal issues of big data and the Internet of Things;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber threat intelligence;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Situational awareness;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Attack modeling, prevention, mitigation, and defense;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Critical infrastructure security policies, standards and regulations;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Vulnerability and risk assessment methodologies for distributed critical infrastructures;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Risk management and cyber insurance;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Simulation and test beds for the security evaluation of critical infrastructures;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Resiliency and security of cyber systems;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Cyber security and privacy policy;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Hardware security solutions;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Incident response;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Encryption, authentication, availability assurance;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Human awareness and training;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Intrusion detection;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Trust and privacy;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Secure communication protocols;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Malware analysis;<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk156917786">Blockchain and ZKPs<o:p></o:p></span></li></ul>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b><u>SUBMISSION GUIDELINES:</u></b><u>
<o:p></o:p></u></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Regular papers</b> submissions may be up to 10 pages in length (including figures and references), formatted in two-column IEEE conference style with font size 10 points or greater. See IEEE Manuscript
Templates for Conference Proceedings.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>WIP (Work-in-progress)</b> papers provide a peer-reviewed forum for late-breaking or preliminary research results, giving an opportunity for researchers and practitioners to present and demonstrate
their recent research and obtain feedback from their peers in a poster session. Work-in-progress papers submissions may be up to 4 pages in length (including figures and references) and must have the prefix "WIP:" in the paper's title.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:1.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Submission platform:</b> EDAS submission platform.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Choose special session:</b> Cybersecurity of Critical Infrastructures (CCI)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Registration:</b> At least one author of each paper must register and present the paper at the conference.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b><o:p> </o:p></b></span></p>
<div style="mso-element:para-border-div;border-top:double windowtext 2.25pt;border-left:none;border-bottom:double windowtext 2.25pt;border-right:none;padding:1.0pt 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk156917786"><b>Important Deadlines<o:p></o:p></b></span></p>
</div>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Full Paper Submission: March 1, 2024<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Notification of Authors: March 31, 2024<o:p></o:p></span></p>
<div style="mso-element:para-border-div;border-top:double windowtext 2.25pt;border-left:none;border-bottom:double windowtext 2.25pt;border-right:none;padding:1.0pt 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk156917786"><b>ORGANIZING COMMITTEE<o:p></o:p></b></span></p>
</div>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Workshop Chairs</b><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Leandros Maglaras, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Leandros Tassiulas, University of Yale, USA<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>TPC Chairs<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Bill Buchanan, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Helge Janicke, Edith Cowan University, Australia
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Publicity Chairs<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Berk Canberk, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Mohamed Amine Ferrag, TII, UAE<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Kitty Kioskli, trustulio, NL<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Yagmur Yigit, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><b>Technical Program Committee<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Iman Almomani, Prince Sultan University, SA<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Nick Ayres, De Montfort University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Christos Chrysoulas, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Andrew Crampton, University of Huddersfield, UK
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Tiago Cruz, University of Coimbra, Portugal<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Abdelouahid Derhab, King Saud University, SA Mohamed Amine Ferrag, TII, UAE<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Vasileios Gkioulos, Norwegian University of Science and Technology, NO<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Ying He, Queen Mary University of London, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Naghmeh Moradpoor, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Mithun Mukherjee, Nanjing University of Information Science and Technology, China<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Huynh Nguyen, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Iqbal H. Sarker, Edith Cowan University, AUS<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">-Iryna Yevseyeva, De Montfort University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Regards,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">Yagmur Yigit<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk156917786">PhD Student, Edinburgh Napier University<o:p></o:p></span></p>
<span style="mso-bookmark:_Hlk156917786"></span>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<table width="100%" cellspacing="0" cellpadding="="0"" border="0" align="left" style="font-family: Arial, Helvetica, san-serif; font-size:10pt;">
<tbody>
<tr>
<td style="padding: 5px;">
<p>This message and its attachment(s) are intended for the addressee(s) only and should not be read, copied, disclosed, forwarded or relied upon by any person other than the intended addressee(s) without the permission of the sender. If you are not the intended
addressee you must not take any action based on this message and its attachment(s) nor must you copy or show them to anyone. Please respond to the sender and ensure that this message and its attachment(s) are deleted.</p>
<p>It is your responsibility to ensure that this message and its attachment(s) are scanned for viruses or other defects. Edinburgh Napier University does not accept liability for any loss or damage which may result from this message or its attachment(s), or
for errors or omissions arising after it was sent. Email is not a secure medium. Emails entering Edinburgh Napier University's system are subject to routine monitoring and filtering by Edinburgh Napier University.</p>
<p>Edinburgh Napier University is a registered Scottish charity. Registration number SC018373</p>
<p>BSL users can contact us via contactSCOTLAND-BSL, the on-line British Sign Language interpreting service. Find out more on the contactSCOTLAND website.</p>
</td>
</tr>
</tbody>
</table>
</body>
</html>