In the modern age Cybermatics is differentiating itself by designing the physical and social places into the cyber space to accomplish the union of three spaces: (i) Physical Cyberworld, (ii) Social Cyberworld, and (iii) Thinking Cyberworld. In the cyber space, everywhere cyber-nodes are significantly independent from the space-time limitations that exist in the physical space. Along with the development of intelligent systems, Cybermatics has brought a wide area of open issues during the cyber interaction, physical perception, social correlation, and cognitive thinking. Currently, Cybermatics is still in its initial stage, and it is expected that Cybermatics will lead industrialization and IT applications to a new level and will significantly change the way of producing, living, and even thinking of the mankind. Cybermatics will transform how we interact with and control the physical world around us, just in the same way as the Internet transformed how we interact and communicate with one another and revolutionized how and where we access information.

Cyber-physical systems are subject to threats stemming from increasing dependence on computer and communication technologies. Cyber security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security, economy, public safety, and health at risk. This workshop aims to represent an opportunity for cyber security researchers, practitioners, policy makers, and users to exchange ideas, research findings, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of Cybermatics security issues.

Capturing security and privacy requirements in the early stages of system development is essential for creating sufficient public confidence in order to facilitate the adoption of novel systems of Cybermatics such as cyber-physical-social (CPS) systems, cyber-physical-social-thinking (CPST) systems, and cyber-physical-thinking (CPT) systems. However, security and privacy requirements are often not handled properly due to their wide variety of facets and aspects which make them difficult to formulate.

The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and as well as practical aspects of Cybermatics.

Topics of interest include, but are not limited to:
  • Access control in Cyber Physical Systems
  • Awareness, training, and simulation
  • Data protection in Cybermatics
  • Cybermatics security strategy
  • Cybermatics security principles
  • Cyber security in the secure infrastructure
  • Identity management in Cyber Physical Systems
  • IP-enabled environment security mechanisms (IPv4 to IPv6 transition)
  • Fault tolerance
  • Monitoring and real-time supervision
  • Man-in-the-middle attack to the data flow in the network
  • Malware and cyberweapons
  • Network security
  • Privacy and security Issues in Cybermatics
  • Risk analysis for Cyber Physical Systems
  • Security architectures
  • Security and privacy in smart metering systems
  • Security in the Internet of Things
  • Security of critical infrastructures
  • Smart grid security
  • System security
  • Service security
  • Third-party key management mechanisms for wearable data devices
  • Vulnerability assessment and metrics

Accepted and presented papers will be included in the IEEE CNS 2015 conference proceedings and also in IEEE Xplore. Distinguished papers will be recommended for the Special Issue on "Cyber-Physical-Social Systems" of IEEE Transactions on Computational Social Systems.