Systems, Man & Cybernetics - July 2016 - 12

TCHS Leadership
I would like to thank the former TCHS chair Prof. Daniel
Zeng (University of Arizona, United States) and SMC
VP Prof. Rodney Roberts (Florida State University, United
States) for their great support. Allow me to introduce the
new TCHS leadership:
◆ Francesco Flammini, Ansaldo STS (Naples, Italy),

chair
◆ Qiudan Li, Chinese Academy of Sciences (Beijing,

China), cochair
◆ Justin Zhan, University of Nevada (Las Vegas,

Nevada, United States), cochair
◆ Chris Yang, Drexel University (Philadelphia,

Pennsylvania, United States), cochair
As you can see, the TCHS chairs represent three
different continents (Europe, Asia, and North America),
and this is a first sign demonstrating the global
importance of the topics related to homeland security
and the joint efforts that are being carried out all over
the world to protect the citizens and the environment
from large scale threat scenarios.

discussions, and facilitate training, education, and
outreach programs.
The TCHS activities performed so far include
◆ publishing several edited books and a research monograph on intelligence and security informatics with
Springer and Elsevier
◆ editing more than five journal special issues on security informatics and surveillance
◆ organizing more than ten conferences, workshops, and
special sessions on topics related to homeland security.
Currently, the TCHS has nine members, but this number
is going to grow in the near future. It is among the objectives of the current leadership to enroll new members
strongly interested in topics related to homeland security
and critical infrastructure (CI) protection, coming from
both the academic and industrial worlds, who are willing to
actively contribute their ideas and proposals to the TCHS
activities. Since homeland security is a highly crossdiscipline and cross-country sector, technical and geographical diversity will be an added value for the TCHS.
We have tried to sketch a reference list of current hot
topics in homeland security and CI research. The list
includes (but it is not limited to)
◆ convergence between cybersecurity and physical security
◆ integrated, holistic, and cohesive approaches to safety
and security design, evaluation, and testing
◆ physical security information management systems
◆ cybersecurity of industrial control systems
◆ CI resilience models, metrics, and indicators
12

IEEE SyStEmS, man, & CybErnEtICS magazInE Ju ly 2016

◆ intelligent multimedia surveillance (multimodal

approaches and audio-video analytics)
◆ emerging cloud computing and Internet of Things
security issues in CI
◆ sensor networks and smart devices for security
◆ threat, vulnerability, and risk assessment for CI
◆ interdependency analysis of CI as cyberphysical systems-of-systems
◆ socioeconomic, procedural, privacy-related, and
human factors in CI
◆ advanced sensing and detecting technologies for CI
◆ attack/penetration testing and other simulation techniques for CI security evaluation
◆ CI intrusion detection and prevention systems
◆ CI business continuity, contingency planning, incident
response, and emergency and crisis management
◆ applications, case-studies, and industrial experience
reports in CI domains, including smart-cities and
smart-transportation.
These will be the tentative topics that will be included in a
special issue of IEEE Transactions on Systems, Man,
and Cybernetics, which we are organizing with the support of the editor-in-chief.
It is clear that, due to the highly heterogeneous sector,
a comprehensive list of topics is very difficult to sketch,
and the current topics are rapidly evolving or being specialized as new technologies are introduced and new
threats are discovered. The complexity, due to systems
size, distribution, and heterogeneity, is, at the same time,



Table of Contents for the Digital Edition of Systems, Man & Cybernetics - July 2016

Systems, Man & Cybernetics - July 2016 - Cover1
Systems, Man & Cybernetics - July 2016 - Cover2
Systems, Man & Cybernetics - July 2016 - 1
Systems, Man & Cybernetics - July 2016 - 2
Systems, Man & Cybernetics - July 2016 - 3
Systems, Man & Cybernetics - July 2016 - 4
Systems, Man & Cybernetics - July 2016 - 5
Systems, Man & Cybernetics - July 2016 - 6
Systems, Man & Cybernetics - July 2016 - 7
Systems, Man & Cybernetics - July 2016 - 8
Systems, Man & Cybernetics - July 2016 - 9
Systems, Man & Cybernetics - July 2016 - 10
Systems, Man & Cybernetics - July 2016 - 11
Systems, Man & Cybernetics - July 2016 - 12
Systems, Man & Cybernetics - July 2016 - 13
Systems, Man & Cybernetics - July 2016 - 14
Systems, Man & Cybernetics - July 2016 - 15
Systems, Man & Cybernetics - July 2016 - 16
Systems, Man & Cybernetics - July 2016 - 17
Systems, Man & Cybernetics - July 2016 - 18
Systems, Man & Cybernetics - July 2016 - 19
Systems, Man & Cybernetics - July 2016 - 20
Systems, Man & Cybernetics - July 2016 - 21
Systems, Man & Cybernetics - July 2016 - 22
Systems, Man & Cybernetics - July 2016 - 23
Systems, Man & Cybernetics - July 2016 - 24
Systems, Man & Cybernetics - July 2016 - Cover3
Systems, Man & Cybernetics - July 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202310
https://www.nxtbook.com/nxtbooks/ieee/smc_202307
https://www.nxtbook.com/nxtbooks/ieee/smc_202304
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com