This minitrack seeks research applying the scientific method to all aspects of cyber system development, deployment, operation, and improvement, particularly as applied to industrial control systems (ICS) and the internet of things (IoT). Desired topics include reverse engineering of devices and protocols; algorithm refinement; signal processing for sensing and anomaly detection; next-generation system communications and security; measurement, data analysis, and reporting; and risk and vulnerability assessment.
We cordially invite all papers applying the principles of scientific inquiry and engineering to cyber systems, particularly the industrial internet of things (IIoT). The convergence of industrial control systems (ICS) and the Internet of Things (IoT), enabled by communications advancements (from 2G -> 5G) and “smart” techniques including machine learning, will have tremendous consequences. Every year, we grow more reliant on IIoT implementations to control and report on everything from critical industrial processes to infrastructure and personal health status. Yet the actual devices and ecosystems are rarely designed, built, or employed in a scalable, secure, and resilient manner. Available data, attack surface, and interdependencies are growing in an exponential fashion without corresponding growth in the tools and techniques to analyze, defend, operate, and optimize these systems.
This minitrack seeks research applying the scientific method to all aspects of IIoT development, deployment, operation, and improvement. Candidate topics apply to all cyber systems as well as IIoT and include:
- Reverse engineering to explore the hardware and software security of devices
- Security of communication protocols – design, analysis, and extensions
- Algorithm development and improvement to enhance system operation
- Signal processing to improve sensing and anomaly detection
- Next generation communications and device protocols, implementations, and enhancement
- Measurement and reporting of device and ecosystem performance
- Process enhancement and optimization
- Data report aggregation, exploration, analysis, and visualization
- Risk and vulnerability assessment methodologies applicable to ICS/IoT ecosystems
We especially seek in-progress and student research with a goal of facilitating expert review and feedback; this is a particular focus of HICSS.
HICSS is recognized as one of the longest-standing system science conferences, ranked by Microsoft Research as #36 overall out of 4,444 tracked conferences. Accepted authors will be invited to present in a high-energy, 10-minute format followed by lengthy audience Q&A.
Sign up and follow your favorite conferences.