CyberICPS is the result of the merging of the CyberICS and WOS-CPS workshops that were held for the first time in conjunction with ESORICS 2015.

Cyber-physical systems (CPS) are physical and engineered systems that interact with the physical environment, whose operations are monitored, coordinated, controlled and integrated by information and communication technologies. These systems exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems, to plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other Industrial Control Systems (ICS). These systems also include the emerging trend of Industrial Internet of Things (IIoT) that will be the central part of the fourth industrial revolution.

As ICS and CPS proliferate, and increasingly interact with us and affect our life, their security becomes of paramount importance. CyberICPS intends to bring together researchers, engineers and governmental actors with an interest in the security of ICS and CPS in the context of their increasing exposure to cyber-space, by offering a forum for discussion on all issues related to their cyber security.


CyberICPS invites submissions that present innovative ideas, proof of concepts, use cases, and results from a variety of topics relevant to ICS and CPS, including (but not limited to) the following ones:

    Security Governance

  • Security policies
  • Risk analysis and management
  • Vulnerability assessment and metrics
  • Awareness, training and simulation
  • ICS/CPS security standards
  • Privacy and Anonymity in ICS/CPS
  • Cyber crisis management
  • System and Network Security

  • Threat modeling
  • Security architectures
  • Access control
  • Malware and cyber weapons
  • Intrusion detection and visualisation
  • Defense in depth
  • Monitoring and real time supervision
  • Applied cryptography
  • Perimeter security

  • Safety-security interactions
  • Cyber security engineering
  • Secure communication protocols
  • Formal models for ICS/CPS security
  • Hardware Security
  • Resilient ICS/CPS
  • Application Security
  • Secure Firmware
  • Incident Response and Digital Forensics for ICS/CPS

  • Forensics in ICS
  • Incident Response
  • Accountability

    Case Studies

  • Case studies in the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure sectors.

General Chairs

Costas Lambrinoudakis

University of Piraeus, Greece

Nora Cuppens

Polytechnique Montréal, Canada

Program Committee Chairs

Sokratis Katsikas

Norwegian University of Science and Technology - NTNU, Norway

Frederic Cuppens

Polytechnique Montréal, Canada

Publicity Chair

Vasileios Gkioulos

Norwegian University of Science and Technology - NTNU, Norway

Program Committee Members

Georgios Kavallieratos

Norwegian University of Science and Technology

Marios Anagnostopoulos

Aalborg University

Cristina Alcaraz

University of Malaga

David Espes

University of Brest

Stefano Longari

Politecnico di Milano

Nikolaos Pitropakis

Edinburgh Napier University

Youssef Laarouchi


Georgios Spathoulas

University of Thessaly

Pankaj Pandey

Norwegian University of Science and Technology

Weizhi Meng

Technical University of Denmark

Nils Ole Tippenhauer

CISPA Helmholtz Center for Information Security

Joaquin Garcia-Alfaro

Institut Polytechnique de Paris

Jianying Zhou

Singapore University of Technology and Design

Andrea Saracino

Consiglio Nazionale delle Ricerche

Dieter Gollmann

Hamburg University of Technology

Frédéric Cuppens

Polytechnique Montréal

Vasileios Gkioulos

Norwegian University of Science and Technology

Mauro Conti

Padova University

Rodrigo Roman

University of Malaga

Khan Ferdous Wahid

Airbus Group

Submission Details

The conference proceedings will be published in the LNCS series. Springer have committed to publishing LNCS proceedings even in the event that conferences are cancelled, held virtually, or postponed. Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. Submissions should be at most 20 pages long, including the bibliography and well-marked appendices, and should follow the LNCS style. Submissions are to be made to the submission web site. Only pdf files will be accepted. Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer’s proceedings LaTeX templates are available in Overleaf. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each accepted paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the submission deadline listed below (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. Pre-proceedings will be made available at the workshop.

For further inquiries, please contact one of the program committee chairs at:
frederic.cuppens[at]polymtl.ca or sokratis.katsikas[at]ntnu.no
Submit Paper

Important Dates

Submission Deadline

July 22, 2022

July 29, 2022

Notification To Authors

July 18 2022

August 26, 2022

Camera-Ready Version

September 17 2022

Joint program of CyberICPS 2022 and SECPRE 2022

    Thursday, 29th September 2022

  • WELCOME 09:00 – 09:10 CET CyberICPS and SECPRE Chairs

  • • (09:10 – 10:00) Security and Privacy by Design in the development of multi-center-based machine learning for personalized health and care: some best practices and practical challenges

    Serge Autexier, German Research Centre for Artificial Intelligence (DFKI)

  • SESSION 1 Chair: Assoc. Prof. Christos Kalloniatis, University of the Aegean 10:00 – 12:00 CET

  • • (10:00 - 10:30 CET) Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies

    Aida Akbarzadeh and Sokratis Katsikas

    • (10:30 - 11:00 CET) Measuring the adoption of TLS Encrypted Client Hello extension and its forebear in the wild

    Zisis Tsiatsikas, Georgios Karopoulos and Georgios Kambourakis

    • (11:00 - 11:30 CET) Coordinated Network Attacks on Microgrid Dispatch Function: An EPIC Case Study

    Muhammad Ramadan Saifuddin, Lin Wei, Tan Heng Chuan and Binbin Chen

    • (11:30 - 12:00 CET) Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles

    Yuqing Zhu, Sridhar Adepu, Ying Yang, Kushagra Dixit and Xin Lou

  • BREAK 12:00 – 14:00 CET

  • SESSION 2 Chair: Prof. Sokratis Katsikas, Norwegian University of Science and Technology - NTNU 14:00 – 16:00 CET

  • • (14:00 - 14:30) Threat Sensitive Networking: on the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions

    Adriaan de Vos, Alessandro Brighente and Mauro Conti

    • (14:30 - 15:00) The effects of the Russo-Ukrainian war on network infrastructures through the lens of BGP

    Zisis Tsiatsikas, Georgios Karopoulos and Georgios Kambourakis

    • (15:00 - 15:30) Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness

    Sunil Chaudhary, Vasileios Gkioulos and David Goodman

    • (15:30 - 16:00) A Framework for Developing Tabletop Cybersecurity Exercises

    Nabin Chowdhury and Vasileios Gkioulos

  • BREAK 16:00 – 16:30 CET

  • SESSION 3 Chair: Chair: Prof. Sokratis Katsikas, Norwegian University of Science and Technology - NTNU 16:30 – 17:30 CET

  • • (16:30 - 17:00) OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the context of Cyber Security

    Mohammad Heydari, Haralambos Mouratidis and Vahid Heydari Fami Tafreshi

    • (17:00 - 17:30) A Hybrid Dynamic Risk Analysis Methodology for Cyber-Physical Systems

    Christos Lyvas, Konstantinos Maliatsos, Andreas Menegatos, Thrasyvoulos Giannakopoulos, Costas Lambrinoudakis, Christos Kalloniatis and Athanasios Kanatas

  • SESSION 4 Exploitation Action 17:30 – 18:30 CET

  • • (17:30 - 18:30) Towards the design of an Ontology-Based Tool for conducting Risk Analysis in cyberphysical systems: The case of the CITYSCAPE Project

    Assoc Prof. Christos Kalloniatis, University of the Aegean (Member of the CITYSCAPE Project Research Team)

Other Info

For further inquiries, please contact one of the program committee chairs at:

frederic.cuppens[at]polymtl.ca or sokratis.katsikas[at]ntnu.no