Loading...

CSR EPES-SPR

2025 IEEE CSR Workshop on Electrical Power and Energy Systems Security, Privacy and Resilience (EPES-SPR)

Chania, Crete, Greece (in-person event) • August 6, 2025


The smart technologies digitize the conventional model of the Electrical Power and Energy Systems (EPES) into a new architectural paradigm, known as the Smart Grid (SG), thus introducing multiple services, such as two-way communication, pervasive control and self-healing. However, despite the benefits, this progression leads to challenging cybersecurity issues due to the vulnerabilities of the new technologies and the necessary presence of legacy and insecure systems, like Supervisory Control and Data Acquisition / Industrial Control Systems. On the other side, anticipating the critical issues of EPES/SG, both academia and industry have developed appropriate countermeasures, considering the advances in the Artificial Intelligence and the networking domains. AI and especially Machine Learning / Deep Learning allow the implementation of detection mechanisms capable of discriminating malicious behaviors as well as zero-day vulnerabilities. Emerging solutions in this sector include security information and event management systems and intrusion detection and prevention systems. Other emblematic technologies that can mitigate or even prevent cyberattacks are honeypots, software-defined networking, network function virtualization and intentional islanding. The workshop focuses on high-quality applied research and innovation results that are obtained from projects.

The CSR EPES-SPR workshop will accept high-quality research papers presenting strong theoretical contributions, applied research and innovation results obtained from funded cyber-security and resilience projects, and industrial papers that promote contributions on technology development and contemporary implementations.

Topics of Interest

Prospective authors are encouraged to submit previously unpublished contributions from a broad range of topics, which include but are not limited to the following:

› AI-powered cybersecurity in EPES/SG
› Sophisticated security orchestration in EPES/SG
› SDN/NFV-based architectures for resilient EPES/SG
› Threat intelligence mechanisms in EPES/SG
› Threat correlation, prioritization and mitigation mechanisms in EPES/SG

› Federated intrusion/anomaly detection and mitigation in EPES/SG
› Business continuity in EPES/SG
› EPES/SG honeypots, honeynets and digital twins
› Self-healing mechanisms in EPES/SG
› Risk assessment, threat modelling and vulnerability analysis in EPES/SG
› AR/VR cybersecurity training, evaluation and certification in EPES/SG

Important Dates

Paper submission deadline: April 14 May 5, 2025 (extended, firm)
Authors’ notification: May 5 May 26, 2025
Camera-ready submission: May 26 June 16, 2025
Registration deadline (authors): May 26 June 16, 2025
Workshop date: August 6, 2025

Submission Guidelines

Submitted manuscripts should not exceed 6 pages (plus 2 extra pages, being subject to overlength page charges) and should be of sufficient detail to be evaluated by expert reviewers in the field. The workshop’s proceedings will be published by IEEE and will be included in IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

The guidelines for authors, manuscript preparation guidelines, and policies of the IEEE CSR conference are applicable to EPES-SPR workshop. Please visit the authors’ instructions page for more details. When submitting your manuscript via the conference management system, please make sure that the workshop’s track 2T7 EPES-SPR is selected in the Topic Areas drop down list.

Workshop Committees

Workshop Chairs


Panagiotis Sarigiannidis
University of Western Macedonia (GR)


Panagiotis Radoglou-Grammatikis
University of Western Macedonia (GR)


Dimitrios Pliatsios
University of Western Macedonia (GR)

Contact Us

psarigiannidis@uowm.gr
pradoglou@uowm.gr

Organizing Committee

Vasilios Argyriou, Kingston University (UK)
Thomas Lagkas, International Hellenic University (GR)
Panagiotis Radoglou-Grammatikis, University of Western Macedonia (GR)
Panagiotis Sarigiannidis, University of Western Macedonia (GR)
Anna Triantafyllou, University of Western Macedonia (GR)

Technical Program Committee

George Amponis, K3Y Ltd (BG)
Vasileios Gkioulos, Norwegian University of Science and Technology (NO)
Eider Iturbe, Tecnalia (ES)
Georgios Karagiannidis, Aristotle University of Thessaloniki (GR)
Sokratis Katsikas, Norwegian University of Science and Technology (NO)
Igor Kotsiuba, Durham Univeristy (UK)
Phu Nguyen, SINTEF (NO)
Erkuden Rios, Tecnalia (ES)
George Seritan, Polytechnic University of Bucharest (RO)
Antonio Skarmeta, Universidad de Murcia (ES)
Barbara Villarini, University of Westminster (UK)

Publicity Chairs

Panagiotis Radoglou-Grammatikis, University of Western Macedonia (GR)

Supported By

Program Information

15:20–17:00 Session WS21: EPES-SPR workshop
Chair: Panagiotis Radoglou-Grammatikis, University of Western Macedonia (GR)
Room: Hall 2
15:20–15:20 Welcome by the chairs
P. Sarigiannidis, P. Radoglou-Grammatikis, and D. Pliatsios
15:20–15:40 Detection of masquerade attacks on protection of digital substations using real-time measurements
M. Elrawy, L. Hadjidemetriou, C. Laoudias, and M. K. Michael
15:40–16:00 Evaluating 5G-enabled EV charging infrastructure’s resilience through stealthy cyber-attacks
D. Psaltis, K. Ntouros, A. Lekidis, S. Brotsis, and N. Kolokotronis
16:00–16:20 Surrogate-guided adversarial attacks: Enabling white-box methods in black-box scenarios
D. C. Asimopoulos, P. Radoglou Grammatikis, P. Fouliras, K. Panitsidis, G. Efstathopoulos, T. Lagkas, V. Argyriou, I. Kotsiuba, and P. Sarigiannidis
16:20–16:40 Fortified control-plane encapsulation with session-key derivation for secure IP mesh routing
G. Amponis, P. Radoglou Grammatikis, T. Lagkas, V. Argyriou, A. Sarigiannidis, N. Kazakli, T. Boufikos, and P. Sarigiannidis
16:40–17:00 Neural cryptanalysis of lightweight block ciphers using residual MLPs
C. Eleftheriadis, G. Andronikidis, A. Lytos, E. Fountoukidis, P. A. Karypidis, T. Lagkas, V. Argyriou, I. Nanos, and P. Sarigiannidis

See also the detailed program of the conference.

Evaluating 5G-enabled EV charging infrastructure’s resilience through stealthy cyber-attacks
D. Psaltis, K. Ntouros, A. Lekidis, S. Brotsis, and N. Kolokotronis

Detection of masquerade attacks on protection of digital substations using real-time measurements
M. Elrawy, L. Hadjidemetriou, C. Laoudias, and M. K. Michael

Neural cryptanalysis of lightweight block ciphers using residual MLPs
C. Eleftheriadis, G. Andronikidis, A. Lytos, E. Fountoukidis, P. A. Karypidis, T. Lagkas, V. Argyriou, I. Nanos, and P. Sarigiannidis

Fortified control-plane encapsulation with session-key derivation for secure IP mesh routing
G. Amponis, P. Radoglou Grammatikis, T. Lagkas, V. Argyriou, A. Sarigiannidis, N. Kazakli, T. Boufikos, and P. Sarigiannidis

Surrogate-guided adversarial attacks: Enabling white-box methods in black-box scenarios
D. C. Asimopoulos, P. Radoglou Grammatikis, P. Fouliras, K. Panitsidis, G. Efstathopoulos, T. Lagkas, V. Argyriou, I. Kotsiuba, and P. Sarigiannidis

See also the accepted papers of the conference.