Notification and Preliminary Call for Papers

The 9th World Congress on Industrial Control Systems Security (WCICSS-2024) is a meeting point for professionals and researchers, IT security professionals, managers, developers, educators, vendors and service providers who are involved in development, integration, assessment, implementation, and operation of industrial cybersecurity technologies. The WCICSS-2024 is an international refereed conference dedicated to the advancement of the theory and practices of Industrial Controls Security and SCADA. Therefore, the conference will provide opportunities to discuss both the current status and emerging trends in protection of industrial control systems.

The objectives of the WCICSS are to bridge the knowledge gap between academia and industry, promote research esteem in Industrial Control Systems Security and the importance of Intelligent Control Applications.

The WCICSS-2024 invites research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in WCICSS-2024 include but are not confined to the following areas:
Advanced Applications
  • Advanced Control Algorithms and Applications
  • Artificial Intelligence and Knowledge Engineering
  • Advanced Robotic Systems
  • Application of Security Content Application Protocol (SCAP) in Industrial Environments
Intelligent Control Theory and Applications
  • ICS Cybersecurity Education and Research
  • ICS, PLC, and SCADA Exploit Analysis
  • ICS and SCADA Fuzzing
  • ICS and SCADA Security Modelling
  • ICS and SCADA Security Metrics
  • ICS Security Standardization and Best Practices
  • ICS Software Security Assurance
  • ICS System Vulnerabilities, Attacks Surface, and Attack Vectors
  • ICS Security-By-Design
  • Image Processing
  • IT Risk Assessment
  • Risk Management in Industrial Environments
  • Intelligent Automation Systems for Manufacturing
  • Integrated Automation Systems
  • Intelligent Transportation Systems
  • Machine Learning
  • Robotics and Artificial Intelligence
  • Robotics and Biomimetics
  • Pattern Recognition
High Assurance Security Controls
  • Baseline and High Assurance Security Controls for ICS and SCADA Security
  • Best Practices in Building and Securing Industrial Control Systems
Networked Control Systems
  • Neurocomputing
  • Nonlinear Systems and Control
  • NANO, MEMS and Mechatronics Systems
  • Sensor Networks
Data Automation
  • Big Data Analysis and Visualization
  • Data-Driven Control
  • Data-Driven Diagnosis
  • Data-Driven Optimization, Scheduling, and Decision Making
  • Data-Driven Operations and Quality Control
  • Data-Based System Performance Analysis
  • ACTA Automatica Sinica
Control Theory and Engineering
  • Control Theory
  • Control System Cybersecurity
  • Control Systems Security Assessments and Audits
  • Control Theory and Applications
  • Critical Infrastructure Cybersecurity
  • Computational Intelligence and Applications
  • Communications and Network Protocol Security in Control Systems
  • Custom tools, Commercial of-the-shelf (COTS) and Government off-the-shelf (GOTS) Solutions for Automation of ICS Security Management
Network Segmentation and Reliability
  • Architecture Design
  • Securing Remote Access
  • Security Convergence
  • ICS Risk Management
Network and Perimeter Security
  • Systems and Server Security
  • Malware Protection
  • Authentication and Access Control
  • Data and Communications Security
  • Vulnerability Assessment
  • Security Incident Management
  • Security Configuration and Patch Management
  • Personnel Security
  • Security Assessment and Audits
Fault Diagnosis and Safe Operation
  • Measurement Methods and Intelligent Instrumentation
  • Online Monitoring for Systems
  • Tools for Security Assessments of Control Systems
  • Technologies for Aggregation and Analysis of Security Events
  • Technologies for enabling ICS
  • Cybersecurity Continuous Monitoring Program
  • Sensors, Sensing and Signal Processing
  • Vulnerability Management in Controls Systems
  • PLC and RTU Security and Vulnerability Assessments
  • Protection of Critical Infrastructure against Persistent Threats and Sophisticated Targeted Attacks
  • Governance and Management aspects of ICS and SCADA Security
Robust Adaptive Control and SCADA
  • Social Robotics
  • Safety and Cybersecurity in Nuclear Power Plant Environments
  • Security Control overlays for ICS and SCADA Systems
  • Smart Grid Cybersecurity
  • Social Engineering and Insider Threat in Critical Infrastructures
  • Secure ICS and SCADA Architectures and Protocols
  • Security patch Management in ICS and SCADA Systems
  • Security of Sensor and Telemetry devices in Control Environments
  • Security Analysis and Scoring Systems
  • Security Event Management
  • System Modelling and Parameter Estimation
  • System Sensing, Modelling and Analysis
  • System Simulation
  • Need to protect Industrial Control Systems from Cyber-Attacks
  • Real World SCADA Security Incidents and Disasters
  • SCADA Security – Current Trends
  • Understanding Common Vulnerabilities in Industrial Control Systems
  • Analyzing Threats to SCADA Systems
  • Assessing and managing SCADA Risks
  • Designing  Comprehensive  SCADA Security Program
  • SCADA Security Standards
  • Essential SCADA Cybersecurity Controls and Countermeasures
  • SCADA Security Controls – Best Practices
  • Aerial Robotics
  • Cellular and Modular Robots
  • Climbing robots
  • Computer Vision for Medical Robotics
  • Domestic Robots
  • Distributed Robot Systems
  • Education Robotics
  • Field Robots
  • Flexible Robots
  • Humanoid Robots
  • Industrial Robots
  • Marine Robotics
  • Mechanism Design of Mobile Robots
  • Medical Robots and Systems
  • Micro/Nano Robots
  • Mining Robotics
  • Multilegged Robots
  • Networked Robots
  • Neurorobotics
  • Parallel Robots
  • Path Planning for Multiple Mobile Robots or Agents
  • Physical Human-Robot Interaction
  • Physically Assistive Devices
  • Redundant Robots
  • Rehabilitation Robotics
  • Robot Companions
  • Robot Safety
  • Robotics in Agriculture and Forestry
  • Robotics in Construction
  • Robotics in Hazardous Fields
  • Robust/Adaptive Control of Robotic Systems
  • Search and Rescue Robots
  • Space Robotics
  • Surgical Robotics: Laparoscopy
  • Surgical Robotics: Planning
  • Surgical Robotics: Steerable Catheters/Needles
  • Surveillance Systems
  • Underactuated Robots
Engineering Optimization
  • Optimization for Industrial Automation Systems
  • Optimization for Decision Making Systems
  • Intelligent Optimization and Applications
Defensive Architectures for Cybersecurity of Safety Systems
  • Cyber Security Defense Techniques
  • Cyber Security in Oil and Gas Industry
  • Cyber Security Risks to SCADA and ICS Systems
  • Cyber Attacks on Industrial Controls Systems
  • Cyber Physical Systems and Sensor Networks
  • Emerging Cybersecurity Technologies for ICS and SCADA Systems
  • Energy Grid Control System Cybersecurity
  • Lessons Learned in ICS and SCADA Cybersecurity
  • Legal, Regulatory and Contractual requirements on ICS and SCADA Security
  • Lifecycle Approaches to ICS and SCADA Cybersecurity
  • Logistics and Supply Chain Optimization
Nuclear Chain Reactions
  • Nuclear Fission Fuel
  • Nuclear Decay Reactions
  • Nuclear Reactors
  • Nuclear Power Plants
  • Nuclear Weapon Design
Nuclear Technology and Applications
  • Nuclear Decommissioning
  • Nuclear Forensics
  • Nuclear Installation Safety
  • Nuclear Science
  • Nuclear Safety and Security
  • Radiation Protection
  • Radioactive Waste and Spent Fuel Management
  • Security of Nuclear and Other Radioactive Material
  • Safety of Nuclear Power Generators
  • Use and Storage of Nuclear Materials

We understand that some presenters will not be able to make the trip to Oxford to present their research paper, case study, work in progress and report, mainly due to financial and/or political restrictions on travel. WCICSS-2024 has therefore instituted a virtual presentation system to allow the authors of accepted papers the same publication opportunities as regular presenters. A research works submitted without the participant attending the conference in person, but presented via video conferencing are refereed and published (if accepted) in the conference proceedings.

You can submit a research paper, case study, work in progress and report for virtual presentation under the open call for papers Online

Proposals from those who would like to facilitate a panel discussion are welcomed. The proposals may address any of the topics falling within the scope of the conference themes.

Panel Discussions provide an opportunity for public discussion amongst a selected group of panelists. Central to the success of a panel discussion is the choice of a good topic as the focus for discussion and panellists who bring differing perspectives and are confident in making clear arguments in a live situation. Panels should comprise of three to five scholars who present their arguments; a discussant offers critical comment on the arguments made and the discussion is opened up to the participating audience.

The proposal must include:

  • Title

  • Panel Chair(s) (if necessary)

  • Speakers Name, Affiliation and Email

  • Scope

  • Objective and motivation

The WCICSS-2024 will set aside space for those who wish to pursue discussion of a particular topic or issue. Interested individuals should submit a proposal not more than 400 words, on or before September 5, 2024. In addition, the proposal should indicate the duration of the panel discussion (preferred duration is 90 minutes).

All accepted Panel Discussion proposal will be published in the Conference Proceedings. If you are interested in organising Panel Discussion for the WCICSS-2024, please email your proposal to the Submissions should be in MS Word format.

The WCICSS-2024 invites speakers to share their knowledge on issues or subject matters of the research work. To be a session speaker, you need to email:

  • Presentation Title

  • Scope (300 words)

  • Objective and Motivation (200 words)

  • Name, Affiliation and Email

If you are interested in giving a talk without submitting a paper, please email your proposal to the The proposal will be reviewed by the Steering Committees. After acceptance, you will receive a feedback on any modification required. All accepted proposals will be published in the proceedings.

The panel discussion members and session speakers are responsible for meeting the costs of their registration, travel and accommodation.

Who should attend the WCICSS?
  • Educators and researchers who are working in the areas of IT, ICS, and SCADA security.
  • Professionals and researchers responsible for security governance of industrial processes supported by ICS and SCADA systems.
  • Information and IT security Professionals and researchers in organizations that deploy industrial control systems, compliance of ICS and SCADA systems with the cybersecurity standards and guidelines.
  • Developers of cybersecurity standards and guidelines for a company, national and international levels.
  • The ICS and SCADA engineers, technicians, IT security professionals, IT management, plant managers, automation and control project managers, IT security auditors, compliance officers, cybersecurity planners, critical infrastructure protection specialists; vendors and assessors of security solutions.
What you can expect at this year’s conference

We listened to all the great feedback we received from last year’s attendees and have incorporated some of their suggestions into WCICSS-2024. Explore highly relevant sessions, led by industry’s and academic top experts. The sessions will giving you the ability to dive deeper into a topic, ask more questions and interact more with presenters. Be inspired by presentations from thought leaders representing a wide range of disciplines within and outside the cyber security. Share a common interest to explore a specific security topic.