<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
{mso-style-priority:34;
margin-top:0cm;
margin-right:0cm;
margin-bottom:0cm;
margin-left:36.0pt;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:589966139;
mso-list-type:hybrid;
mso-list-template-ids:2088805012 134807553 134807555 134807557 134807553 134807555 134807557 134807553 134807555 134807557;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Symbol;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:"Courier New";}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:none;
mso-level-number-position:left;
text-indent:-18.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0cm;}
ul
{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-GB" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal" style="line-height:105%"><a name="_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></a></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">We apologize if you receive multiple copies of this CFPs.<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">We appreciate your help to contribute & forward this CFPs to your friends.<o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%;text-autospace:none">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">You are cordially invited to submit your latest research results to the CCNI 2025. <o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%;text-autospace:none">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR" style="font-size:5.0pt;line-height:105%"><o:p> </o:p></span></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;text-autospace:none">
<span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">CALL FOR PAPERS<o:p></o:p></span></b></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">The 31st IEEE International Symposium on Local and Metropolitan Area Networks
<o:p></o:p></span></b></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">(CCNI 2025)<o:p></o:p></span></b></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">co-organized with IEEE WOWMOM 2025<o:p></o:p></span></b></span></p>
<p class="MsoNormal" align="center" style="text-align:center;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">27–30 May 2025 | Fort Worth, Texas, USA<o:p></o:p></span></span></p>
<p class="MsoNormal" align="center" style="margin-bottom:12.0pt;text-align:center">
<span style="mso-bookmark:_Hlk189327173"></span><a href="https://sites.google.com/view/ccni2025/"><span style="mso-bookmark:_Hlk189327173">https://sites.google.com/view/ccni2025/</span><span style="mso-bookmark:_Hlk189327173"></span></a><span style="mso-bookmark:_Hlk189327173">
</span><span style="mso-bookmark:_Hlk189327173"><span lang="TR"><o:p></o:p></span></span></p>
<p class="MsoNormal" style="text-align:justify;line-height:105%"><span style="mso-bookmark:_Hlk189327173">Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare, and the national security of countries. Vulnerabilities
of critical infrastructures have increased with the widespread use of information technologies. As CNIs are becoming more vulnerable to cyberattacks, their protection becomes a significant issue for any organization as well as nation. The risks to continued
operations from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes are considered higher given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures
with significant destructive effects, the cyber security of CNIs has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioral aspects is essential to handle cyber security
effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this workshop, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned
with the interdisciplinary nature of cyber security, authors from academia, government, and industry are welcome to contribute.<o:p></o:p></span></p>
<p class="MsoNormal" style="text-align:justify;line-height:105%"><span style="mso-bookmark:_Hlk189327173">The topics include, but not limited to:</span><span style="mso-bookmark:_Hlk189327173"><span lang="TR"><o:p></o:p></span></span></p>
<ul style="margin-top:0cm" type="disc">
<li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Cyber security of industrial control systems<b><o:p></o:p></b></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Cyber security modeling and simulation<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Cyber threat modeling and analysis<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Safety-security interactions<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Behavioral modeling<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Network security and protocols<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Security, privacy, and legal issues of big data and the Internet of Things<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Cyber threat intelligence<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Situational awareness<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Attack modeling, prevention, mitigation, and defense<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Critical infrastructure security policies, standards and regulations<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Encryption, authentication, availability assurance<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Human awareness and training<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Intrusion detection<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Trust and privacy<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Secure communication protocols<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Malware analysis<o:p></o:p></span></span></li><li class="MsoListParagraph" style="margin-left:0cm;line-height:105%;mso-list:l0 level1 lfo1">
<span style="mso-bookmark:_Hlk189327173"><span lang="TR">Blockchain and ZKPs<o:p></o:p></span></span></li></ul>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR"><o:p> </o:p></span></b></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR"><o:p> </o:p></span></b></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">Submission<o:p></o:p></span></b></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><u>SUBMISSION LINK:</u> </b></span><a href="https://edas.info/N33085" target="_blank"><span style="mso-bookmark:_Hlk189327173"><b>https://edas.info/N33085</b></span><span style="mso-bookmark:_Hlk189327173"></span></a><span style="mso-bookmark:_Hlk189327173"><b> </b></span><span style="mso-bookmark:_Hlk189327173"><span lang="TR"><o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">REGULAR PAPERS<o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">Regular papers submissions may be up to 10 pages in length (including figures and references), formatted in two-column IEEE conference
style with font size 10 points or greater. See </span></span><a href="https://www.ieee.org/conferences/publishing/templates.html" target="_blank"><span style="mso-bookmark:_Hlk189327173">IEEE Manuscript Templates for Conference Proceedings.</span><span style="mso-bookmark:_Hlk189327173"></span></a><span style="mso-bookmark:_Hlk189327173"><span lang="TR"><o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">WORK IN PROGRESS PAPERS<o:p></o:p></span></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">WIP (Work-in-progress) papers provide a peer-reviewed forum for late-breaking or preliminary research results, giving an opportunity for
researchers and practitioners to present and demonstrate their recent research and obtain feedback from their peers in a poster session. Work-in-progress papers submissions may be up to 4 pages in length (including figures and references) and must have the
prefix "WIP:" in the paper's title.<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR">Important Dates<o:p></o:p></span></b></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR" style="color:#C00000">Submission deadline: 15 March, 2025<o:p></o:p></span></b></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">Acceptance notification: 15 April, 2025<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">Camera-ready deadline: 23 April, 2025<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR"><o:p> </o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<p class="MsoNormal" style="line-height:105%"><span style="mso-bookmark:_Hlk189327173"><b>Organizing Committee</b></span><span style="mso-bookmark:_Hlk189327173"><b><span lang="TR"><o:p></o:p></span></b></span></p>
<p class="MsoNormal" style="margin-bottom:8.0pt;line-height:105%"><span style="mso-bookmark:_Hlk189327173"><span lang="TR">========================================<o:p></o:p></span></span></p>
<span style="mso-bookmark:_Hlk189327173"></span>
<p class="MsoNormal"><span lang="TR">Workshop Chairs<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR">-Dianqi Han, University of Texas at Arlington, United States,
<a href="mailto:dianqi.han@uta.edu">dianqi.han@uta.edu</a> <o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR"> -Helge Janicke, Edith Cowan University, Australia,
<a href="mailto:h.janicke@ecu.edu.au">h.janicke@ecu.edu.au</a> <o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR"> -Leandros Maglaras, De Montfort University, UK,
<a href="mailto:Leandros.maglaras2@dmu.ac.uk">Leandros.maglaras2@dmu.ac.uk</a> <o:p>
</o:p></span></p>
<p class="MsoNormal"><span lang="TR"><o:p> </o:p></span></p>
<p class="MsoNormal"><span lang="TR">Publicity Chairs<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR">-Kate Carney Landow, IEEE Region 5 Women in Engineering, USA<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR">-Kitty Kioskli, trustilio, NL<o:p></o:p></span></p>
<p class="MsoNormal"><span lang="TR">-Yagmur Yigit, Edinburgh Napier University, UK<o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Regards,<o:p></o:p></p>
<p class="MsoNormal">Yagmur Yigit<o:p></o:p></p>
<p class="MsoNormal"><span lang="TR">PhD Student, Edinburgh Napier University</span><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
<table width="100%" cellspacing="0" cellpadding="="0"" border="0" align="left" style="font-family: Arial, Helvetica, san-serif; font-size:10pt;">
<tbody>
<tr>
<td style="padding: 5px;">
<p>This message and its attachment(s) are intended for the addressee(s) only and should not be read, copied, disclosed, forwarded or relied upon by any person other than the intended addressee(s) without the permission of the sender. If you are not the intended
addressee you must not take any action based on this message and its attachment(s) nor must you copy or show them to anyone. Please respond to the sender and ensure that this message and its attachment(s) are deleted.</p>
<p>It is your responsibility to ensure that this message and its attachment(s) are scanned for viruses or other defects. Edinburgh Napier University does not accept liability for any loss or damage which may result from this message or its attachment(s), or
for errors or omissions arising after it was sent. Email is not a secure medium. Emails entering Edinburgh Napier University's system are subject to routine monitoring and filtering by Edinburgh Napier University.</p>
<p>Edinburgh Napier University is a registered Scottish charity. Registration number SC018373</p>
<p>BSL users can contact us via contactSCOTLAND-BSL, the on-line British Sign Language interpreting service. Find out more on the contactSCOTLAND website.</p>
</td>
</tr>
</tbody>
</table>
</body>
</html>