Special Issue "Advanced Topics in Systems Safety and Security"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information and Communications Technology".

Deadline for manuscript submissions: 1 March 2020.

Special Issue Editors

Guest Editor
Dr. Emil Pricop Website E-Mail
Automatic Control, Computers & Electronics Department, Petroleum-Gas University of Ploiesti, Romania
Interests: cyber security; industrial control systems security; sensor networks; systems resilience; systems safety; smart technologies
Guest Editor
Dr. Grigore Stamatescu Website E-Mail
Department of Automatic Control and Industrial Informatics, University "Politehnica" of Bucharest, Romania
Interests: networked embedded sensing; information processing; control engineering; building automation; smart city
Guest Editor
Dr. Jaouhar Fattahi Website E-Mail
Computer Science and Software Engineering Department, Laval University, Quebec Citty, Canada
Interests: cryptographic protocols; anomaly and intrusion detection; machine learning; deep learning; cyber security and pentesting

Special Issue Information

Dear Colleagues,

This Special Issue will present high-quality papers on systems safety and security. It will be focused especially on extended versions of selected papers presented at the International Workshop on Systems Safety and Security—IWSSS, but other valuable and relevant contributions in this field could be submitted.

The International Workshop on Systems Safety and Security was initiated in 2013 by an enthusiastic researchers’ team. IWSSS 2019 is the 7th edition of the workshop, which has proven to be a prestigious scientific event.

The previous editions of our workshop brought together renowned professors and researchers, practitioners, and implementers from industry, young scientists and specialists from all over the world, making IWSSS a real bridge between academia and industry.

We warmly invite researchers to submit their contributions to this Special Issue. Potential topics include but are not limited to:

  • systems security and safety;
  • industrial control systems resilience;
  • formal methods for security;
  • data security and privacy in critical systems;
  • physical and logical access control;
  • biometric identification of persons;
  • malware detection, modeling, and analysis methods;
  • security assessment, pen-testing, vulnerability evaluation;
  • wireless sensor networks security;
  • artificial intelligence used in the field of safety and security;
  • industrial control systems security;
  • assets tracking, monitoring, and surveillance solutions;
  • advanced encryption techniques.

Authors of invited papers should be aware that the final submitted manuscript must provide a minimum of 50% new content.

Dr. Emil Pricop
Dr. Grigore Stamatescu
Dr. Jaouhar Fattahi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Systems security
  • Systems safety
  • Industrial controls systems resilience
  • Cybersecurity
  • Information security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


Open AccessArticle
Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees
Information 2019, 10(8), 251; https://doi.org/10.3390/info10080251 - 29 Jul 2019
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on [...] Read more.
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative and systematic evaluation of attacks on a DAS. In the DAS security architecture, AT nodes are traversed and used to represent the attack path. The CVSS is used to quantify the attack sequence, which is the leaf node in an AT. This paper proposes a method to calculate each attack path probability and find the maximum attack path probability in DASs based on attacker behavior. The AT model is suitable for DAS hierarchical features in architecture. The experimental results show that the proposed model can reduce the influence of subjective factors on attack quantification, improve the probability of predicting attacks on the DASs, generate attack paths, better identify attack characteristics, and determine the attack path and quantification probability. The quantitative results of the model’s evaluation can find the most vulnerable component of a DAS and provide an important reference for developing targeted defensive measures in DASs. Full article
(This article belongs to the Special Issue Advanced Topics in Systems Safety and Security)
Show Figures

Figure 1

Back to TopTop