<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0cm;
mso-margin-bottom-alt:auto;
margin-left:0cm;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle18
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle19
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle20
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle21
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle23
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle24
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle25
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle26
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle27
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle28
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle29
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle30
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=FR link="#0563C1" vlink="#954F72"><div class=WordSection1><p class=MsoNormal><b><i><span style='color:black;background:yellow;mso-highlight:yellow'>Apologies if you receive multiple copies</span><span style='color:black'> </span><o:p></o:p></i></b></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:14.0pt'>19th International Conference on Risks and Security of Internet and Systems (CRiSIS 2024)<o:p></o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:12.0pt'>November 26th - 28th, 2024<o:p></o:p></span></b></p><p class=MsoNormal align=center style='text-align:center'><b><span style='font-size:12.0pt'>Aix-en-Provence, France<o:p></o:p></span></b></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>The 19th International Conference on Risks and Security of Internet and Systems (CRiSIS) in 2024</b> continues its tradition of addressing critical security challenges in Internet-connected applications, networks, and systems. The indispensability of the Internet for information exchange among diverse user groups and organizations has led to heightened risks around security and privacy. This vulnerability is exacerbated by the sophistication of online attacks, the proliferation of cybercrime, and the readily available tools for attackers, who are increasingly motivated and skilled.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The advent of complex technologies, including pervasive computing, mobile, and wireless devices and networks, introduces new security challenges, necessitating the deployment of advanced security mechanisms and techniques. These advancements are crucial for protecting critical sectors such as energy, transportation, health, defense, banking, critical infrastructures, embedded systems and networks, avionics systems, and more, ensuring an acceptable level of security assurance.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>CRiSIS 2024</b> serves as an essential platform for stakeholders in computer and network security from the industrial, academic, and governmental sectors to convene, share insights, and showcase the latest developments in combating Internet-related security threats, vulnerabilities, and the necessary countermeasures to address them.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>TOPICS<o:p></o:p></b></p><p class=MsoNormal><b>======<o:p></o:p></b></p><p class=MsoNormal>We target contributions from both academia and industrials on the following topics, but not limited to:<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>- AI and machine learning-based security approaches<o:p></o:p></p><p class=MsoNormal>- Formal methods and logics-centered security approaches<o:p></o:p></p><p class=MsoNormal>- Analysis and management of risk<o:p></o:p></p><p class=MsoNormal>- Attacks and defenses<o:p></o:p></p><p class=MsoNormal>- Attack data acquisition and network monitoring<o:p></o:p></p><p class=MsoNormal>- Authorization, Authentication, and Identity Management<o:p></o:p></p><p class=MsoNormal>- Blockchain and Distributed Ledger Technologies<o:p></o:p></p><p class=MsoNormal>- Cryptography, biometrics, watermarking<o:p></o:p></p><p class=MsoNormal>- Dependability and fault tolerance of Internet applications<o:p></o:p></p><p class=MsoNormal>- Distributed systems security and safety<o:p></o:p></p><p class=MsoNormal>- Embedded system security and safety<o:p></o:p></p><p class=MsoNormal>- Empirical methods for security and risk evaluation<o:p></o:p></p><p class=MsoNormal>- Hardware-based security and physical security<o:p></o:p></p><p class=MsoNormal>- Intrusion detection and prevention systems<o:p></o:p></p><p class=MsoNormal>- Organizational, ethical, and legal issues<o:p></o:p></p><p class=MsoNormal>- Privacy protection and anonymization<o:p></o:p></p><p class=MsoNormal>- Risk-aware access and usage control<o:p></o:p></p><p class=MsoNormal>- Analysis and management of cyber crisis<o:p></o:p></p><p class=MsoNormal>- Security and risk assessment<o:p></o:p></p><p class=MsoNormal>- Security and risks metrics<o:p></o:p></p><p class=MsoNormal>- Security and dependability of operating systems<o:p></o:p></p><p class=MsoNormal>- Security and safety of critical infrastructures<o:p></o:p></p><p class=MsoNormal>- Security and privacy of peer-to-peer system<o:p></o:p></p><p class=MsoNormal>- Security and privacy of wireless networks<o:p></o:p></p><p class=MsoNormal>- Security in Cloud/Edge/Fog computing<o:p></o:p></p><p class=MsoNormal>- Security models and security policies<o:p></o:p></p><p class=MsoNormal>- Security of big data<o:p></o:p></p><p class=MsoNormal>- Security of industrial control systems<o:p></o:p></p><p class=MsoNormal>- Security of intelligent transportation systems<o:p></o:p></p><p class=MsoNormal>- Security of e-commerce, electronic voting, and database systems<o:p></o:p></p><p class=MsoNormal>- Security of new-generation networks<o:p></o:p></p><p class=MsoNormal>- Security of smart cities<o:p></o:p></p><p class=MsoNormal>- Security of smart grid<o:p></o:p></p><p class=MsoNormal>- Security of social networks<o:p></o:p></p><p class=MsoNormal>- Security of the IoT and IIoT<o:p></o:p></p><p class=MsoNormal>- Security of VoIP and multimedia<o:p></o:p></p><p class=MsoNormal>- Smartphone security and privacy<o:p></o:p></p><p class=MsoNormal>- Traceability, metrology and forensics<o:p></o:p></p><p class=MsoNormal>- Trust management<o:p></o:p></p><p class=MsoNormal>- Ubiquitous computing security<o:p></o:p></p><p class=MsoNormal>- Use of smart cards and personal devices for Internet applications<o:p></o:p></p><p class=MsoNormal>- Virtualization security<o:p></o:p></p><p class=MsoNormal>- Web and Web-service security<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>IMPORTANT DATES<o:p></o:p></b></p><p class=MsoNormal><b>================<o:p></o:p></b></p><p class=MsoNormal>Submission deadline: June 15th, 2024<o:p></o:p></p><p class=MsoNormal>Notification of acceptance: July 15th, 2024<o:p></o:p></p><p class=MsoNormal>Camera-ready paper due: October 15th, 2024<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>PAPER SUBMISSION<o:p></o:p></b></p><p class=MsoNormal><b>=================<o:p></o:p></b></p><p class=MsoNormal>Submitted papers must not significantly overlap with papers already published or those being concurrently submitted to a journal or conference with proceedings. Papers should be written in English and submitted electronically in PDF format.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Selected papers presented at the conference will be included in the post-proceedings, to be published by Springer in the Lecture Notes in Computer Science (LNCS) series. Authors are required to revise their papers according to review comments before publication. Pre-proceedings will be available at the time of the conference.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The maximum length for submissions is 16 pages for full papers and 6 pages for short papers, following the LNCS formatting guidelines. We recommend the use of LNCS Springer Overleaf Template (<a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.overleaf.com%2Flatex%2Ftemplates%2Fspringer-lecture-notes-in-computer-science%2Fkzwwpvhwnvfj%23.WtR5Hy5ua71&data=05%7C02%7C%7C82cb8218995e49b2412f08dc7ade61f3%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638520342760757945%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C60000%7C%7C%7C&sdata=vUVL801EkPmBl0wWJGwPLQ%2BRLVpMVjGi9q4yKFrdUIk%3D&reserved=0" originalSrc="https://www.overleaf.com/latex/templates/springer-lecture-notes-in-computer-science/kzwwpvhwnvfj#.WtR5Hy5ua71" shash="wwK+D4veCKRYe4gHF3a6TgAKfQF9IMp0Q3of54MOz2hdo0UOQWwUH6DeoMSiP/qBHUuVydDdFDTlhYTBXPJI1QB/MFL090i2bDg2RcSgF/WDJX6HbXNrLcSqH0jcfiGpL8KBmR1upnjTBl48qTVKPunM0sy26w51GCU4d1ujjxo=">https://www.overleaf.com/latex/templates/springer-lecture-notes-in-computer-science/kzwwpvhwnvfj#.WtR5Hy5ua71</a>). Authors must upload their paper as PDF file using the EasyChair<o:p></o:p></p><p class=MsoNormal>submission system: <a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Feasychair.org%2Fconferences%2F%3Fconf%3Dcrisis2024&data=05%7C02%7C%7C82cb8218995e49b2412f08dc7ade61f3%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638520342760757945%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C60000%7C%7C%7C&sdata=lvWjHv6npeif5JFuhPndtCrURJnnbzREMRJCyMWpwqk%3D&reserved=0" originalSrc="https://easychair.org/conferences/?conf=crisis2024" shash="GxbJjXvpCIsQTQ9v3JOKv9z22ahcMuhsaaJMIv1Tm8Zpv1I/Rw45YqZRN5QffM3GTKmjjS46TkqTH0TgQL8kJhAWdqCuQXZq5OzyG2tl+v89ms81ylJ2rGu+w1sw8pe+RV59aqwPfW17rNCIrkHBBHHQZxm1c+ID1cBMCz6YTX4=">https://easychair.org/conferences/?conf=crisis2024</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>WEB SITE<o:p></o:p></b></p><p class=MsoNormal><b>========</b><o:p></o:p></p><p class=MsoNormal><a href="https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcrisis2024.univ-gustave-eiffel.fr%2F&data=05%7C02%7C%7C82cb8218995e49b2412f08dc7ade61f3%7Ccc7df24760ce4a0f9d75704cf60efc64%7C0%7C0%7C638520342760757945%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C60000%7C%7C%7C&sdata=5PBC8v6RJAv8ju0b9R41afxlaVPYA9I5PJ9MiiQJlWg%3D&reserved=0" originalSrc="https://crisis2024.univ-gustave-eiffel.fr/" shash="zOf6GVIzn0OP523ee3mg2+Kxc8T0kKzxcMTz0ViLceTjXezGIa8MKj+aY1yh1r8xAhpTcRmXVicMMBOtPlHOmiU/iEPnWxYPPv5AlULtjPU6/OaDX3rC1GkEICBTtk098sM4jQV+zKKis6KkrVoOwn1QYZjWnt69rUWPlmzPcgw=">https://crisis2024.univ-gustave-eiffel.fr</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>GENERAL CHAIRS<o:p></o:p></b></p><p class=MsoNormal><b>==============<o:p></o:p></b></p><p class=MsoNormal>- Frédéric Cuppens, Polytechnique Montreal, Canada<o:p></o:p></p><p class=MsoNormal>- Nora Cuppens, Polytechnique Montreal, Canada<o:p></o:p></p><p class=MsoNormal>- Jean-Paul Mizzi, Université Gustave Eiffel, France<o:p></o:p></p><p class=MsoNormal>- David Garcia, CESI Lineact, France<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>PROGRAM COMMITTEE CHAIRS<o:p></o:p></b></p><p class=MsoNormal><b>==========================<o:p></o:p></b></p><p class=MsoNormal>- Simon Collart Dutilleul, Université Gustave Eiffel, France<o:p></o:p></p><p class=MsoNormal>- Samir Ouchani, CESI Lineact, France<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>PUBLICITY CHAIRS<o:p></o:p></b></p><p class=MsoNormal><b>===============<o:p></o:p></b></p><p class=MsoNormal>- Slim Kallel, University of Sfax, Tunisia<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>ORGANIZING COMMITTE<o:p></o:p></b></p><p class=MsoNormal><b>=====================<o:p></o:p></b></p><p class=MsoNormal>- David Garcia, CESI Lineact, France<o:p></o:p></p><p class=MsoNormal>- Amine Mohammed Boudouaia, CESI Lineact, France<o:p></o:p></p><p class=MsoNormal>- Malika Benkhalifa, Ecole d'Ingénieurs CESI, France<o:p></o:p></p><p class=MsoNormal>- Philippe Bon, Gustave Eiffel University, France<o:p></o:p></p><p class=MsoNormal>- Seddik Reguieg, Gustave Eiffel University, France<o:p></o:p></p><p class=MsoNormal>- Valérie Osmont, Gustave Eiffel University, France<o:p></o:p></p><p class=MsoNormal>- Danielle Zennir, Gustave Eiffel University, France<o:p></o:p></p><p class=MsoNormal>- Danielle Zennir, Gustave Eiffel University, France<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><b>=============================<o:p></o:p></b></p><p class=MsoNormal><b>Dr. Samir Ouchani, Ing., PhD., HDR.<o:p></o:p></b></p><p class=MsoNormal><b>Research Director, CESI Lineact.<o:p></o:p></b></p><p class=MsoNormal><b>Aix-en-Provence, France.<o:p></o:p></b></p></div></body></html>