<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin-top:0cm;
margin-right:0cm;
margin-bottom:8.0pt;
margin-left:0cm;
line-height:105%;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:376972189;
mso-list-type:hybrid;
mso-list-template-ids:-816402066 69140481 69140483 69140485 69140481 69140483 69140485 69140481 69140483 69140485;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="TR" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<div style="mso-element:para-border-div;border:none;border-bottom:double windowtext 2.25pt;padding:0cm 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><b><o:p> </o:p></b></p>
</div>
<p class="MsoNormal"><a name="_Hlk160203146">We apologize if you receive multiple copies of this CFPs.<o:p></o:p></a></p>
<div style="mso-element:para-border-div;border:none;border-bottom:double windowtext 2.25pt;padding:0cm 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk160203146">We appreciate your help to contribute & forward this CFPs to your friends.<o:p></o:p></span></p>
</div>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk160203146">You are cordially invited to submit your latest research results to the ICS-CSR 2024 Symposium. <o:p></o:p></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal" style="text-autospace:none"><span style="mso-bookmark:_Hlk160203146"><b>CALL FOR PAPERS<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>7th International Symposium for Industrial Control System & SCADA Cyber Security Research co-organized with the 19th International Conference on Availability, Reliability and Security (ARES 2024),
<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>August 1st 2024 // University of Vienna, Vienna, Austria<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Symposium Website:</b>
</span><a href="https://sites.google.com/view/ics-csr/"><span style="mso-bookmark:_Hlk160203146">https://sites.google.com/view/ics-csr/</span><span style="mso-bookmark:_Hlk160203146"></span></a><span style="mso-bookmark:_Hlk160203146">
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Conference Website:</b>
</span><a href="https://www.ares-conference.eu/"><span style="mso-bookmark:_Hlk160203146">https://www.ares-conference.eu/</span><span style="mso-bookmark:_Hlk160203146"></span></a><span style="mso-bookmark:_Hlk160203146"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b><span style="color:#C00000">SUBMISSION DEADLINE: May 12, 2024<o:p></o:p></span></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>SUBMISSION LINK:</b>
</span><a href="https://easychair.org/conferences/?conf=ares2024"><span style="mso-bookmark:_Hlk160203146">https://easychair.org/conferences/?conf=ares2024
</span><span style="mso-bookmark:_Hlk160203146"></span></a><span style="mso-bookmark:_Hlk160203146"> <o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">The 7th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure
to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such
as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases,
and results from a variety of domains with a wish to enhance the security of infrastructure.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Proceedings of the ICS-CSR are hosted by the ACM (ACM ICPS).<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">ICS-CSR is welcoming contributions that have a direct application or relevance to security aspects of Distributed Control Systems (DCS), Supervisory Control and Data Acquisition Systems (SCADA),
Industrial Control Systems (ICS), Operational Technology (OT), Cyber Physical Systems (CPS), Industrial Internet of Things (IIoT), Smart City, or Industry 4.0.
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">This list of topics is not meant to be exhaustive; ICS-CSR is interested in all aspects of computer security relating to ICS. Papers without a clear application to SCADA, Embedded Systems or Industrial
Control, however, will be considered out of scope and may be rejected without full review.<o:p></o:p></span></p>
<ul style="margin-top:0cm" type="disc">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk160203146">Hardware Security Solutions<o:p></o:p></span></li><ul style="margin-top:0cm" type="circle">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Encryption, Authentication, Availability Assurance<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Resilient Systems<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Application Security<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Secure Firmware<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Communication Systems<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Timing Vulnerabilities in RT-Control Systems<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Security Implications of Feature Interactions<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Post-quantum cryptography<o:p></o:p></span></li></ul>
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk160203146">System Security<o:p></o:p></span></li><ul style="margin-top:0cm" type="circle">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Security Architectures<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Safety-Security Interactions<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Intrusion Detection<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Security Monitoring<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Malware Analysis<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Cyber Security Engineering<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Vulnerability Assessment/Screening<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Secure Communication Protocols<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Metrics<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Anonymity<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Language-based Security<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Network Security<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Patching and MaintenanceBehavioral modeling;<o:p></o:p></span></li></ul>
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk160203146">Digital Forensics and Response<o:p></o:p></span></li><ul style="margin-top:0cm" type="circle">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Hardware Forensics<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Incident Response<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Live Forensics<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Accountability<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Forensic Readiness<o:p></o:p></span></li></ul>
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk160203146">Security Management<o:p></o:p></span></li><ul style="margin-top:0cm" type="circle">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Risk Management<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Security Metrics<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Governance and Policy<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Business Continuity<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Critical Infrastructure Protection<o:p></o:p></span></li></ul>
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level1 lfo1"><span style="mso-bookmark:_Hlk160203146">Human Factors Security<o:p></o:p></span></li><ul style="margin-top:0cm" type="circle">
<li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Awareness and Training<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Behavioural Modelling<o:p></o:p></span></li><li class="MsoListParagraph" style="margin-left:0cm;mso-list:l0 level2 lfo1"><span style="mso-bookmark:_Hlk160203146">Threat Profiling<o:p></o:p></span></li></ul>
</ul>
<p class="MsoListParagraph"><span style="mso-bookmark:_Hlk160203146"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b><u>SUBMISSION GUIDELINES:</u></b><u>
<o:p></o:p></u></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">The submission guidelines valid for the workshop are the same as for the ARES conference. They can be found at
</span><a href="https://www.ares-conference.eu/conference/submission/"><span style="mso-bookmark:_Hlk160203146">https://www.ares-conference.eu/conference/submission/</span><span style="mso-bookmark:_Hlk160203146"></span></a><span style="mso-bookmark:_Hlk160203146">.</span><span style="mso-bookmark:_Hlk160203146"><span style="font-size:1.0pt;line-height:105%"><o:p></o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Submission platform:</b> EDAS submission platform.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Choose Track:</b> ICS-CSR 2024<o:p></o:p></span></p>
<div style="mso-element:para-border-div;border-top:double windowtext 2.25pt;border-left:none;border-bottom:double windowtext 2.25pt;border-right:none;padding:1.0pt 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk160203146"><b>Important Deadlines<o:p></o:p></b></span></p>
</div>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Paper Submission Due: May 12, 2024<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Acceptance Notification: May 29, 2024<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Proceedings version: June 18, 2024<o:p></o:p></span></p>
<div style="mso-element:para-border-div;border-top:double windowtext 2.25pt;border-left:none;border-bottom:double windowtext 2.25pt;border-right:none;padding:1.0pt 0cm 1.0pt 0cm">
<p class="MsoNormal" style="border:none;padding:0cm"><span style="mso-bookmark:_Hlk160203146"><b>ORGANIZING COMMITTEE<o:p></o:p></b></span></p>
</div>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Workshop Chairs</b><o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">- Angela Smith, Airbus<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Helge Janicke. Edith Cowan University<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Thomas Brandstetter, Limes Security/ FHSTP, Austria<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Richard Smith, De Montfort University<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Leandros Maglaras, Edinburgh Napier University<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><b>Publicity Chairs<o:p></o:p></b></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Kitty Kioskli, trustulio, NL<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">-Yagmur Yigit, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146"><span style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Regards,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">Yagmur Yigit<o:p></o:p></span></p>
<p class="MsoNormal"><span style="mso-bookmark:_Hlk160203146">PhD Student, Edinburgh Napier University</span><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<table width="100%" cellspacing="0" cellpadding="="0"" border="0" align="left" style="font-family: Arial, Helvetica, san-serif; font-size:10pt;">
<tbody>
<tr>
<td style="padding: 5px;">
<p>This message and its attachment(s) are intended for the addressee(s) only and should not be read, copied, disclosed, forwarded or relied upon by any person other than the intended addressee(s) without the permission of the sender. If you are not the intended
addressee you must not take any action based on this message and its attachment(s) nor must you copy or show them to anyone. Please respond to the sender and ensure that this message and its attachment(s) are deleted.</p>
<p>It is your responsibility to ensure that this message and its attachment(s) are scanned for viruses or other defects. Edinburgh Napier University does not accept liability for any loss or damage which may result from this message or its attachment(s), or
for errors or omissions arising after it was sent. Email is not a secure medium. Emails entering Edinburgh Napier University's system are subject to routine monitoring and filtering by Edinburgh Napier University.</p>
<p>Edinburgh Napier University is a registered Scottish charity. Registration number SC018373</p>
<p>BSL users can contact us via contactSCOTLAND-BSL, the on-line British Sign Language interpreting service. Find out more on the contactSCOTLAND website.</p>
</td>
</tr>
</tbody>
</table>
</body>
</html>