Search dblp for Publications

export results for "stream:streams/conf/ics-csr:"

 download as .bib file

@inproceedings{DBLP:conf/ics-csr/AntrobusFRG16,
  author       = {Rob Antrobus and
                  Sylvain Frey and
                  Awais Rashid and
                  Benjamin Green},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {SimaticScan: Towards {A} Specialised Vulnerability Scanner for Industrial
                  Control Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56473},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/AntrobusFRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CanzaniKL16,
  author       = {Elisa Canzani and
                  Helmut Kaufmann and
                  Ulrike Lechner},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Characterising Disruptive Events to Model Cascade Failures in Critical
                  Infrastructures},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56482},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CanzaniKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CheminodDMVZ16,
  author       = {Manuel Cheminod and
                  Luca Durante and
                  Marcello Maggiora and
                  Adriano Valenzano and
                  Claudio Zunino},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Performance of Firewalls for Industrial Applications},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56477},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CheminodDMVZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/ChromikRH16,
  author       = {Justyna J. Chromik and
                  Anne Remke and
                  Boudewijn R. Haverkort},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Improving {SCADA} security of a local process with a power grid model},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56485},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/ChromikRH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CookSMJ16,
  author       = {Allan Cook and
                  Richard Smith and
                  Leandros A. Maglaras and
                  Helge Janicke},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Using Gamification to Raise Awareness of Cyber Threats to Critical
                  National Infrastructure},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56481},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CookSMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CookSMJ16a,
  author       = {Allan Cook and
                  Richard Smith and
                  Leandros A. Maglaras and
                  Helge Janicke},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Measuring the Risk of Cyber Attack in Industrial Control Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56483},
  timestamp    = {Tue, 07 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CookSMJ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBCJSS16,
  author       = {Peter Eden and
                  Andrew Blyth and
                  Pete Burnap and
                  Yulia Cherdantseva and
                  Kevin Jones and
                  Hugh Soulsby and
                  Kristan Stoddart},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Forensic Readiness for {SCADA/ICS} Incident Response},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56489},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/EdenBBCJSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/FielderLH16,
  author       = {Andrew Fielder and
                  Tingting Li and
                  Chris Hankin},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Defense-in-depth vs. Critical Component Defense for Industrial Control
                  Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56472},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/FielderLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/FriedbergMSW16,
  author       = {Ivo Friedberg and
                  Kieran McLaughlin and
                  Paul Smith and
                  Markus Wurzenberger},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Towards a Resilience Metric Framework for Cyber-Physical Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56474},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/FriedbergMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/KangMS16,
  author       = {BooJoong Kang and
                  Kieran McLaughlin and
                  Sakir Sezer},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Towards {A} Stateful Analysis Framework for Smart Grid Network Intrusion
                  Detection},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56486},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/KangMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/KhanMMLS16,
  author       = {Rafiullah Khan and
                  Peter Maynard and
                  Kieran McLaughlin and
                  David M. Laverty and
                  Sakir Sezer},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time
                  Control and Monitoring in Smart Grid},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56478},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/KhanMMLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemayRF16,
  author       = {Antoine Lemay and
                  Jonathan Rochon and
                  Jos{\'{e}} M. Fernandez},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {A Practical flow white list approach for {SCADA} systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56475},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemayRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/PaudelSZ16,
  author       = {Sarita Paudel and
                  Paul Smith and
                  Tanja Zseby},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Data Integrity Attacks in Smart Grid Wide Area Monitoring},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56480},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/PaudelSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/TebbeNF16,
  author       = {Christopher Tebbe and
                  Karl{-}Heinz Niemann and
                  Alexander Fay},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Ontology and life cycle of knowledge for {ICS} security assessments},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56476},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/TebbeNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/WainRJJ16,
  author       = {Andrew Wain and
                  Stephan Reiff{-}Marganiec and
                  Kevin I. Jones and
                  Helge Janicke},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Towards a Distributed Runtime Monitor for {ICS/SCADA} Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56488},
  timestamp    = {Fri, 09 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/WainRJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/WolfWSHWH16,
  author       = {Jan Wolf and
                  Felix Wieczorek and
                  Frank Schiller and
                  Gerhard Hansch and
                  Norbert Wiedermann and
                  Martin Hutle},
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {Adaptive Modelling for Security Analysis of Networked Control Systems},
  booktitle    = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/content/ConWebDoc/56479},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/WolfWSHWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ics-csr/2016,
  editor       = {Thomas Brandstetter and
                  Helge Janicke},
  title        = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast
                  University, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2016},
  url          = {http://ewic.bcs.org/category/18853},
  timestamp    = {Thu, 08 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CarstenAYMR15,
  author       = {Paul Carsten and
                  Todd R. Andel and
                  Mark Yampolskiy and
                  Jeffrey Todd McDonald and
                  Samuel H. Russ},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A System to Recognize Intruders in Controller Area Network {(CAN)}},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.15},
  doi          = {10.14236/EWIC/ICS2015.15},
  timestamp    = {Tue, 06 Feb 2024 10:57:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CarstenAYMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CheminodDSV15,
  author       = {Manuel Cheminod and
                  Luca Durante and
                  Lucia Seno and
                  Adriano Valenzano},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Analysis of Exploitable Vulnerability Sequences in Industrial Networked
                  Systems: {A} Proof of Concepts},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.7},
  doi          = {10.14236/EWIC/ICS2015.7},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CheminodDSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/DavidsonDCYA15,
  author       = {Cordell C. Davidson and
                  Joel A. Dawson and
                  Paul Carsten and
                  Mark Yampolskiy and
                  Todd R. Andel},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Investigating the Applicability of a Moving Target Defense for {SCADA}
                  systems},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.14},
  doi          = {10.14236/EWIC/ICS2015.14},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/DavidsonDCYA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/EdenBBJS15,
  author       = {Peter Eden and
                  Andrew Blyth and
                  Pete Burnap and
                  Kevin Jones and
                  Kristan Stoddart},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Forensic Taxonomy of {SCADA} Systems and Approach to Incident Response},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.5},
  doi          = {10.14236/EWIC/ICS2015.5},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/EdenBBJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/FriedbergLMS15,
  author       = {Ivo Friedberg and
                  David M. Laverty and
                  Kieran McLaughlin and
                  Paul Smith},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid
                  Operation},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.6},
  doi          = {10.14236/EWIC/ICS2015.6},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/FriedbergLMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/HeJ15,
  author       = {Ying He and
                  Helge Janicke},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Towards Agile Industrial Control Systems Incident Response},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.11},
  doi          = {10.14236/EWIC/ICS2015.11},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/HeJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/Lang-MuhrST15,
  author       = {Christoph Lang{-}Muhr and
                  Matthias Schrattenholzer and
                  Paul Tavolato},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced
                  Metering Infrastructures},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.12},
  doi          = {10.14236/EWIC/ICS2015.12},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/Lang-MuhrST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemaireVJN15,
  author       = {Laurens Lemaire and
                  Jan Vossaert and
                  Joachim Jansen and
                  Vincent Naessens},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based
                  System},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.1},
  doi          = {10.14236/EWIC/ICS2015.1},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemaireVJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LiH15,
  author       = {Tingting Li and
                  Chris Hankin},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Model-based Approach to Interdependency between Safety and Security
                  in {ICS}},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.4},
  doi          = {10.14236/EWIC/ICS2015.4},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LiH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/SchlegelOS15,
  author       = {Roman Schlegel and
                  Sebastian Obermeier and
                  Johannes Schneider},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Assessing the Security of {IEC} 62351},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.2},
  doi          = {10.14236/EWIC/ICS2015.2},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/SchlegelOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/SchneiderOS15,
  author       = {Johannes Schneider and
                  Sebastian Obermeier and
                  Roman Schlegel},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Cyber Security Maintenance for {SCADA} Systems},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.10},
  doi          = {10.14236/EWIC/ICS2015.10},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/SchneiderOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/SerbanescuOY15,
  author       = {Alexandru Vlad Serbanescu and
                  Sebastian Obermeier and
                  Der{-}Yeuan Yu},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {{ICS} Threat Analysis Using a Large-Scale Honeynet},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.3},
  doi          = {10.14236/EWIC/ICS2015.3},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/SerbanescuOY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/SettanniSKGTBCC15,
  author       = {Giuseppe Settanni and
                  Florian Skopik and
                  Helmut Kaufmann and
                  Tobias Gebhardt and
                  Klaus Theuerkauf and
                  Konstantin B{\"{o}}ttinger and
                  Mark Carolan and
                  Damien Conroy and
                  Pia Olli},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Blueprint for a Pan-European Cyber Incident Analysis System},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.9},
  doi          = {10.14236/EWIC/ICS2015.9},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/SettanniSKGTBCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/TzokatziouMJ15,
  author       = {Grigoris Tzokatziou and
                  Leandros A. Maglaras and
                  Helge Janicke},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Insecure by Design: Using Human Interface Devices to exploit {SCADA}
                  systems},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.13},
  doi          = {10.14236/EWIC/ICS2015.13},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/TzokatziouMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/WedgburyJ15,
  author       = {Adam Wedgbury and
                  Kevin Jones},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Automated Asset Discovery in Industrial Control Systems - Exploring
                  the Problem},
  booktitle    = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  url          = {https://doi.org/10.14236/ewic/ICS2015.8},
  doi          = {10.14236/EWIC/ICS2015.8},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/WedgburyJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ics-csr/2015,
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of
                  Applied Sciences Ingolstadt, Germany},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2015},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14,
  author       = {Alessio Antonini and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Practical Attack Against a KNX-based Building Automation System},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53231},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/AragoMC14,
  author       = {Antonio S{\'{a}}nchez Arag{\'{o}} and
                  Enrique Redondo Mart{\'{\i}}nez and
                  Sandra Sal{\'{a}}n Clares},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {{SCADA} Laboratory and Test-bed as a Service for Critical Infrastructure
                  Protection},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53227},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/AragoMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/ChapasHLO14,
  author       = {Robin Chapas and
                  Ana Hristova and
                  Thomas Locher and
                  Sebastian Obermeier},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Securing Industrial Control Systems through Autonomous Hardening},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53226},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/ChapasHLO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/CheminodDSV14,
  author       = {Manuel Cheminod and
                  Luca Durante and
                  Lucia Seno and
                  Adriano Valenzano},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Automated Analysis of Access Policies in Industrial Plants},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53229},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/CheminodDSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/GreenPRBH14,
  author       = {Benjamin Green and
                  Daniel Prince and
                  Utz Roedig and
                  Jerry S. Busby and
                  David Hutchison},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Socio-Technical Security Analysis of Industrial Control Systems {(ICS)}},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53225},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/GreenPRBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemaireLDN14,
  author       = {Laurens Lemaire and
                  Jorn Lapon and
                  Bart De Decker and
                  Vincent Naessens},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A SysML Extension for Security Analysis of Industrial Control Systems},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53223},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemaireLDN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemayKFK14,
  author       = {Antoine Lemay and
                  Marina Krotofil and
                  Jos{\'{e}} M. Fernandez and
                  Scott Knight},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Not all {SCADA} is Equal: Impact of Control Models on {ICS} Threat
                  Landscape},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53234},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemayKFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/MaynardMH14,
  author       = {Peter Maynard and
                  Kieran McLaughlin and
                  Berthold Haberler},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Towards Understanding Man-in-the-middle Attacks on {IEC} 60870-5-104
                  {SCADA} Networks},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53228},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/MaynardMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/McLaughlinSSMS14,
  author       = {Kieran McLaughlin and
                  Sakir Sezer and
                  Paul Smith and
                  Zhendong Ma and
                  Florian Skopik},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {{PRECYSE:} Cyber-attack Detection and Response for Industrial Control
                  Systems},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53233},
  timestamp    = {Mon, 18 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/McLaughlinSSMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/NicholsonJC14,
  author       = {Andrew Nicholson and
                  Helge Janicke and
                  Antonio Cau},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Position Paper: Safety and Security Monitoring in {ICS/SCADA} Systems},
  booktitle    = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/content/ConWebDoc/53232},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/NicholsonJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ics-csr/2014,
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten,
                  Austria},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2014},
  url          = {http://ewic.bcs.org/category/18233},
  isbn         = {978-1-78017-286-6},
  timestamp    = {Thu, 25 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/BertolottiDHV13,
  author       = {Ivan Cibrario Bertolotti and
                  Luca Durante and
                  Tingting Hu and
                  Adriano Valenzano},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {A Model for the Analysis of Security Policies in Industrial Networks},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51170},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/BertolottiDHV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/Blyth13,
  author       = {Andrew J. C. Blyth},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Role Logic and its Application to the Analysis of Process Control
                  Systems from the Socio - Technical System Perspective},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51167},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/Blyth13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/KnowlesPHDJ13,
  author       = {William Knowles and
                  Daniel Prince and
                  David Hutchison and
                  Jules Ferdinand Pagna Disso and
                  Kevin Jones},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Towards Real-Time Assessment of Industrial Control Systems (ICSs):
                  {A} Framework for Future Research},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51177},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/KnowlesPHDJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/LemayFK13,
  author       = {Antoine Lemay and
                  Jos{\'{e}} M. Fernandez and
                  Scott Knight},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {An isolated virtual cluster for {SCADA} network security research},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51172},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ics-csr/LemayFK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/MorrisG13,
  author       = {Thomas H. Morris and
                  Wei Gao},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Industrial Control System Cyber Attacks},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51165},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/MorrisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/NicholsonJW13,
  author       = {Andrew Nicholson and
                  Helge Janicke and
                  Tim Watson},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {An Initial Investigation into Attribution in {SCADA} Systems},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51169},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/NicholsonJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/OatesTH13,
  author       = {Robert F. Oates and
                  Fran Thom and
                  Graham Herries},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Security-Aware, Model-Based Systems Engineering with SysML},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51171},
  timestamp    = {Thu, 25 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/OatesTH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/Robinson13,
  author       = {Michael Robinson},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {The {SCADA} Threat Landscape},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51166},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/Robinson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/SoniKKM13,
  author       = {Amit Soni and
                  Sye Loong Keoh and
                  Sandeep S. Kumar and
                  Oscar Garc{\'{\i}}a Morchon},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {{HADA:} Hybrid Access Decision Architecture for Building Automation
                  and Control Systems},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51163},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/SoniKKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/WahidKR13,
  author       = {Khan Ferdous Wahid and
                  Nicolai Kuntze and
                  Carsten Rudolph},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Trusted Virtual Machine Management for Virtualization in Critical
                  Environments},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51168},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/WahidKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/WuDJC13,
  author       = {Tina Wu and
                  Jules Ferdinand Pagna Disso and
                  Kevin Jones and
                  Adrian Campos},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Towards a {SCADA} Forensics Architecture},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51164},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/WuDJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/YasakethuJ13,
  author       = {S. L. P. Yasakethu and
                  J. Jiang},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Intrusion Detection via Machine Learning for {SCADA} System Protection},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51176},
  timestamp    = {Thu, 24 Sep 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/YasakethuJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ics-csr/2013,
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/category/17691},
  isbn         = {978-1-780172-32-3},
  timestamp    = {Thu, 25 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics