Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/ics-csr:"
@inproceedings{DBLP:conf/ics-csr/AntrobusFRG16, author = {Rob Antrobus and Sylvain Frey and Awais Rashid and Benjamin Green}, editor = {Thomas Brandstetter and Helge Janicke}, title = {SimaticScan: Towards {A} Specialised Vulnerability Scanner for Industrial Control Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56473}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/AntrobusFRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CanzaniKL16, author = {Elisa Canzani and Helmut Kaufmann and Ulrike Lechner}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Characterising Disruptive Events to Model Cascade Failures in Critical Infrastructures}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56482}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/CanzaniKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CheminodDMVZ16, author = {Manuel Cheminod and Luca Durante and Marcello Maggiora and Adriano Valenzano and Claudio Zunino}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Performance of Firewalls for Industrial Applications}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56477}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/CheminodDMVZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/ChromikRH16, author = {Justyna J. Chromik and Anne Remke and Boudewijn R. Haverkort}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Improving {SCADA} security of a local process with a power grid model}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56485}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/ChromikRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CookSMJ16, author = {Allan Cook and Richard Smith and Leandros A. Maglaras and Helge Janicke}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56481}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/CookSMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CookSMJ16a, author = {Allan Cook and Richard Smith and Leandros A. Maglaras and Helge Janicke}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Measuring the Risk of Cyber Attack in Industrial Control Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56483}, timestamp = {Tue, 07 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/CookSMJ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/EdenBBCJSS16, author = {Peter Eden and Andrew Blyth and Pete Burnap and Yulia Cherdantseva and Kevin Jones and Hugh Soulsby and Kristan Stoddart}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Forensic Readiness for {SCADA/ICS} Incident Response}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56489}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBCJSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/FielderLH16, author = {Andrew Fielder and Tingting Li and Chris Hankin}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Defense-in-depth vs. Critical Component Defense for Industrial Control Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56472}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/FielderLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/FriedbergMSW16, author = {Ivo Friedberg and Kieran McLaughlin and Paul Smith and Markus Wurzenberger}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Towards a Resilience Metric Framework for Cyber-Physical Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56474}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/FriedbergMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/KangMS16, author = {BooJoong Kang and Kieran McLaughlin and Sakir Sezer}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Towards {A} Stateful Analysis Framework for Smart Grid Network Intrusion Detection}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56486}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/KangMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/KhanMMLS16, author = {Rafiullah Khan and Peter Maynard and Kieran McLaughlin and David M. Laverty and Sakir Sezer}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56478}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/KhanMMLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemayRF16, author = {Antoine Lemay and Jonathan Rochon and Jos{\'{e}} M. Fernandez}, editor = {Thomas Brandstetter and Helge Janicke}, title = {A Practical flow white list approach for {SCADA} systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56475}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/LemayRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/PaudelSZ16, author = {Sarita Paudel and Paul Smith and Tanja Zseby}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Data Integrity Attacks in Smart Grid Wide Area Monitoring}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56480}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/PaudelSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/TebbeNF16, author = {Christopher Tebbe and Karl{-}Heinz Niemann and Alexander Fay}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Ontology and life cycle of knowledge for {ICS} security assessments}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56476}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/TebbeNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/WainRJJ16, author = {Andrew Wain and Stephan Reiff{-}Marganiec and Kevin I. Jones and Helge Janicke}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Towards a Distributed Runtime Monitor for {ICS/SCADA} Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56488}, timestamp = {Fri, 09 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/WainRJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/WolfWSHWH16, author = {Jan Wolf and Felix Wieczorek and Frank Schiller and Gerhard Hansch and Norbert Wiedermann and Martin Hutle}, editor = {Thomas Brandstetter and Helge Janicke}, title = {Adaptive Modelling for Security Analysis of Networked Control Systems}, booktitle = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/content/ConWebDoc/56479}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/WolfWSHWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ics-csr/2016, editor = {Thomas Brandstetter and Helge Janicke}, title = {4th International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2016, {ICS-CSR} 2016, 23 - 25 August 2016, Queen's Belfast University, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2016}, url = {http://ewic.bcs.org/category/18853}, timestamp = {Thu, 08 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CarstenAYMR15, author = {Paul Carsten and Todd R. Andel and Mark Yampolskiy and Jeffrey Todd McDonald and Samuel H. Russ}, editor = {Helge Janicke and Kevin I. Jones}, title = {A System to Recognize Intruders in Controller Area Network {(CAN)}}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.15}, doi = {10.14236/EWIC/ICS2015.15}, timestamp = {Tue, 06 Feb 2024 10:57:24 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/CarstenAYMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CheminodDSV15, author = {Manuel Cheminod and Luca Durante and Lucia Seno and Adriano Valenzano}, editor = {Helge Janicke and Kevin I. Jones}, title = {Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: {A} Proof of Concepts}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.7}, doi = {10.14236/EWIC/ICS2015.7}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/CheminodDSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/DavidsonDCYA15, author = {Cordell C. Davidson and Joel A. Dawson and Paul Carsten and Mark Yampolskiy and Todd R. Andel}, editor = {Helge Janicke and Kevin I. Jones}, title = {Investigating the Applicability of a Moving Target Defense for {SCADA} systems}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.14}, doi = {10.14236/EWIC/ICS2015.14}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/DavidsonDCYA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/EdenBBJS15, author = {Peter Eden and Andrew Blyth and Pete Burnap and Kevin Jones and Kristan Stoddart}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Forensic Taxonomy of {SCADA} Systems and Approach to Incident Response}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.5}, doi = {10.14236/EWIC/ICS2015.5}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/EdenBBJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/FriedbergLMS15, author = {Ivo Friedberg and David M. Laverty and Kieran McLaughlin and Paul Smith}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.6}, doi = {10.14236/EWIC/ICS2015.6}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/FriedbergLMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/HeJ15, author = {Ying He and Helge Janicke}, editor = {Helge Janicke and Kevin I. Jones}, title = {Towards Agile Industrial Control Systems Incident Response}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.11}, doi = {10.14236/EWIC/ICS2015.11}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/HeJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/Lang-MuhrST15, author = {Christoph Lang{-}Muhr and Matthias Schrattenholzer and Paul Tavolato}, editor = {Helge Janicke and Kevin I. Jones}, title = {Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.12}, doi = {10.14236/EWIC/ICS2015.12}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/Lang-MuhrST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemaireVJN15, author = {Laurens Lemaire and Jan Vossaert and Joachim Jansen and Vincent Naessens}, editor = {Helge Janicke and Kevin I. Jones}, title = {Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.1}, doi = {10.14236/EWIC/ICS2015.1}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/LemaireVJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LiH15, author = {Tingting Li and Chris Hankin}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Model-based Approach to Interdependency between Safety and Security in {ICS}}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.4}, doi = {10.14236/EWIC/ICS2015.4}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/LiH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/SchlegelOS15, author = {Roman Schlegel and Sebastian Obermeier and Johannes Schneider}, editor = {Helge Janicke and Kevin I. Jones}, title = {Assessing the Security of {IEC} 62351}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.2}, doi = {10.14236/EWIC/ICS2015.2}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/SchlegelOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/SchneiderOS15, author = {Johannes Schneider and Sebastian Obermeier and Roman Schlegel}, editor = {Helge Janicke and Kevin I. Jones}, title = {Cyber Security Maintenance for {SCADA} Systems}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.10}, doi = {10.14236/EWIC/ICS2015.10}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/SchneiderOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/SerbanescuOY15, author = {Alexandru Vlad Serbanescu and Sebastian Obermeier and Der{-}Yeuan Yu}, editor = {Helge Janicke and Kevin I. Jones}, title = {{ICS} Threat Analysis Using a Large-Scale Honeynet}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.3}, doi = {10.14236/EWIC/ICS2015.3}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/SerbanescuOY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/SettanniSKGTBCC15, author = {Giuseppe Settanni and Florian Skopik and Helmut Kaufmann and Tobias Gebhardt and Klaus Theuerkauf and Konstantin B{\"{o}}ttinger and Mark Carolan and Damien Conroy and Pia Olli}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Blueprint for a Pan-European Cyber Incident Analysis System}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.9}, doi = {10.14236/EWIC/ICS2015.9}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/SettanniSKGTBCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/TzokatziouMJ15, author = {Grigoris Tzokatziou and Leandros A. Maglaras and Helge Janicke}, editor = {Helge Janicke and Kevin I. Jones}, title = {Insecure by Design: Using Human Interface Devices to exploit {SCADA} systems}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.13}, doi = {10.14236/EWIC/ICS2015.13}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/TzokatziouMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/WedgburyJ15, author = {Adam Wedgbury and Kevin Jones}, editor = {Helge Janicke and Kevin I. Jones}, title = {Automated Asset Discovery in Industrial Control Systems - Exploring the Problem}, booktitle = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, url = {https://doi.org/10.14236/ewic/ICS2015.8}, doi = {10.14236/EWIC/ICS2015.8}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/WedgburyJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ics-csr/2015, editor = {Helge Janicke and Kevin I. Jones}, title = {3rd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2015, {ICS-CSR} 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2015}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/AntoniniMZ14, author = {Alessio Antonini and Federico Maggi and Stefano Zanero}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Practical Attack Against a KNX-based Building Automation System}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53231}, timestamp = {Thu, 25 Aug 2016 11:36:27 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/AntoniniMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/AragoMC14, author = {Antonio S{\'{a}}nchez Arag{\'{o}} and Enrique Redondo Mart{\'{\i}}nez and Sandra Sal{\'{a}}n Clares}, editor = {Helge Janicke and Kevin I. Jones}, title = {{SCADA} Laboratory and Test-bed as a Service for Critical Infrastructure Protection}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53227}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/AragoMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/ChapasHLO14, author = {Robin Chapas and Ana Hristova and Thomas Locher and Sebastian Obermeier}, editor = {Helge Janicke and Kevin I. Jones}, title = {Securing Industrial Control Systems through Autonomous Hardening}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53226}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/ChapasHLO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/CheminodDSV14, author = {Manuel Cheminod and Luca Durante and Lucia Seno and Adriano Valenzano}, editor = {Helge Janicke and Kevin I. Jones}, title = {Automated Analysis of Access Policies in Industrial Plants}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53229}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/CheminodDSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/GreenPRBH14, author = {Benjamin Green and Daniel Prince and Utz Roedig and Jerry S. Busby and David Hutchison}, editor = {Helge Janicke and Kevin I. Jones}, title = {Socio-Technical Security Analysis of Industrial Control Systems {(ICS)}}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53225}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/GreenPRBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemaireLDN14, author = {Laurens Lemaire and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Helge Janicke and Kevin I. Jones}, title = {A SysML Extension for Security Analysis of Industrial Control Systems}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53223}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/LemaireLDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemayKFK14, author = {Antoine Lemay and Marina Krotofil and Jos{\'{e}} M. Fernandez and Scott Knight}, editor = {Helge Janicke and Kevin I. Jones}, title = {Not all {SCADA} is Equal: Impact of Control Models on {ICS} Threat Landscape}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53234}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/LemayKFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/MaynardMH14, author = {Peter Maynard and Kieran McLaughlin and Berthold Haberler}, editor = {Helge Janicke and Kevin I. Jones}, title = {Towards Understanding Man-in-the-middle Attacks on {IEC} 60870-5-104 {SCADA} Networks}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53228}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/MaynardMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/McLaughlinSSMS14, author = {Kieran McLaughlin and Sakir Sezer and Paul Smith and Zhendong Ma and Florian Skopik}, editor = {Helge Janicke and Kevin I. Jones}, title = {{PRECYSE:} Cyber-attack Detection and Response for Industrial Control Systems}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53233}, timestamp = {Mon, 18 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/McLaughlinSSMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/NicholsonJC14, author = {Andrew Nicholson and Helge Janicke and Antonio Cau}, editor = {Helge Janicke and Kevin I. Jones}, title = {Position Paper: Safety and Security Monitoring in {ICS/SCADA} Systems}, booktitle = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/content/ConWebDoc/53232}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/NicholsonJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ics-csr/2014, editor = {Helge Janicke and Kevin I. Jones}, title = {2nd International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2014, {ICS-CSR} 2014, 11-12 September 2014, St. P{\"{o}}lten, Austria}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2014}, url = {http://ewic.bcs.org/category/18233}, isbn = {978-1-78017-286-6}, timestamp = {Thu, 25 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/BertolottiDHV13, author = {Ivan Cibrario Bertolotti and Luca Durante and Tingting Hu and Adriano Valenzano}, editor = {Helge Janicke and Kevin I. Jones}, title = {A Model for the Analysis of Security Policies in Industrial Networks}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51170}, timestamp = {Thu, 25 Aug 2016 11:36:27 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/BertolottiDHV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/Blyth13, author = {Andrew J. C. Blyth}, editor = {Helge Janicke and Kevin I. Jones}, title = {Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51167}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/Blyth13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/KnowlesPHDJ13, author = {William Knowles and Daniel Prince and David Hutchison and Jules Ferdinand Pagna Disso and Kevin Jones}, editor = {Helge Janicke and Kevin I. Jones}, title = {Towards Real-Time Assessment of Industrial Control Systems (ICSs): {A} Framework for Future Research}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51177}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/KnowlesPHDJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/LemayFK13, author = {Antoine Lemay and Jos{\'{e}} M. Fernandez and Scott Knight}, editor = {Helge Janicke and Kevin I. Jones}, title = {An isolated virtual cluster for {SCADA} network security research}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51172}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ics-csr/LemayFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/MorrisG13, author = {Thomas H. Morris and Wei Gao}, editor = {Helge Janicke and Kevin I. Jones}, title = {Industrial Control System Cyber Attacks}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51165}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/MorrisG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/NicholsonJW13, author = {Andrew Nicholson and Helge Janicke and Tim Watson}, editor = {Helge Janicke and Kevin I. Jones}, title = {An Initial Investigation into Attribution in {SCADA} Systems}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51169}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/NicholsonJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/OatesTH13, author = {Robert F. Oates and Fran Thom and Graham Herries}, editor = {Helge Janicke and Kevin I. Jones}, title = {Security-Aware, Model-Based Systems Engineering with SysML}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51171}, timestamp = {Thu, 25 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/OatesTH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/Robinson13, author = {Michael Robinson}, editor = {Helge Janicke and Kevin I. Jones}, title = {The {SCADA} Threat Landscape}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51166}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/Robinson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/SoniKKM13, author = {Amit Soni and Sye Loong Keoh and Sandeep S. Kumar and Oscar Garc{\'{\i}}a Morchon}, editor = {Helge Janicke and Kevin I. Jones}, title = {{HADA:} Hybrid Access Decision Architecture for Building Automation and Control Systems}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51163}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/SoniKKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/WahidKR13, author = {Khan Ferdous Wahid and Nicolai Kuntze and Carsten Rudolph}, editor = {Helge Janicke and Kevin I. Jones}, title = {Trusted Virtual Machine Management for Virtualization in Critical Environments}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51168}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/WahidKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/WuDJC13, author = {Tina Wu and Jules Ferdinand Pagna Disso and Kevin Jones and Adrian Campos}, editor = {Helge Janicke and Kevin I. Jones}, title = {Towards a {SCADA} Forensics Architecture}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51164}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/WuDJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ics-csr/YasakethuJ13, author = {S. L. P. Yasakethu and J. Jiang}, editor = {Helge Janicke and Kevin I. Jones}, title = {Intrusion Detection via Machine Learning for {SCADA} System Protection}, booktitle = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/content/ConWebDoc/51176}, timestamp = {Thu, 24 Sep 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/YasakethuJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ics-csr/2013, editor = {Helge Janicke and Kevin I. Jones}, title = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2013}, url = {http://ewic.bcs.org/category/17691}, isbn = {978-1-780172-32-3}, timestamp = {Thu, 25 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ics-csr/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.