export record
dblp key:
conf/ics-csr/TzokatziouMJ15 share record
persistent URL:
Grigoris Tzokatziou , Leandros A. Maglaras , Helge Janicke : Insecure by Design: Using Human Interface Devices to exploit SCADA systems. ICS-CSR 2015 share record
persistent URL:
Adam Wedgbury , Kevin Jones : Automated Asset Discovery in Industrial Control Systems - Exploring the Problem. ICS-CSR 2015 share record
persistent URL:
Helge Janicke , Kevin I. Jones : 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, ICS-CSR 2015, 17-18 September 2015, University of Applied Sciences Ingolstadt, Germany. Workshops in Computing , BCS 2015 [contents] 2014 export record
dblp key:
conf/ics-csr/AntoniniMZ14 share record
persistent URL:
Alessio Antonini , Federico Maggi , Stefano Zanero : A Practical Attack Against a KNX-based Building Automation System. ICS-CSR 2014 share record
persistent URL:
Antonio Sánchez Aragó , Enrique Redondo Martínez , Sandra Salán Clares : SCADA Laboratory and Test-bed as a Service for Critical Infrastructure Protection. ICS-CSR 2014 share record
persistent URL:
Robin Chapas , Ana Hristova , Thomas Locher , Sebastian Obermeier : Securing Industrial Control Systems through Autonomous Hardening. ICS-CSR 2014 export record
dblp key:
conf/ics-csr/CheminodDSV14 share record
persistent URL:
Manuel Cheminod , Luca Durante , Lucia Seno , Adriano Valenzano : Automated Analysis of Access Policies in Industrial Plants. ICS-CSR 2014 share record
persistent URL:
Benjamin Green , Daniel Prince , Utz Roedig , Jerry S. Busby , David Hutchison : Socio-Technical Security Analysis of Industrial Control Systems (ICS). ICS-CSR 2014 export record
dblp key:
conf/ics-csr/LemaireLDN14 share record
persistent URL:
Laurens Lemaire , Jorn Lapon , Bart De Decker , Vincent Naessens : A SysML Extension for Security Analysis of Industrial Control Systems. ICS-CSR 2014 share record
persistent URL:
Antoine Lemay , Marina Krotofil , José M. Fernandez , Scott Knight : Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape. ICS-CSR 2014 share record
persistent URL:
Peter Maynard , Kieran McLaughlin , Berthold Haberler : Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks. ICS-CSR 2014 export record
dblp key:
conf/ics-csr/McLaughlinSSMS14 share record
persistent URL:
Kieran McLaughlin , Sakir Sezer , Paul Smith , Zhendong Ma , Florian Skopik : PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. ICS-CSR 2014 export record
dblp key:
conf/ics-csr/NicholsonJC14 share record
persistent URL:
Andrew Nicholson , Helge Janicke , Antonio Cau : Position Paper: Safety and Security Monitoring in ICS/SCADA Systems. ICS-CSR 2014 share record
persistent URL:
Helge Janicke , Kevin I. Jones : 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria. Workshops in Computing , BCS 2014 , ISBN 978-1-78017-286-6 [contents] 2013 export record
dblp key:
conf/ics-csr/BertolottiDHV13 share record
persistent URL:
Ivan Cibrario Bertolotti , Luca Durante , Tingting Hu , Adriano Valenzano : A Model for the Analysis of Security Policies in Industrial Networks. ICS-CSR 2013 share record
persistent URL:
Andrew J. C. Blyth : Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective. ICS-CSR 2013 export record
dblp key:
conf/ics-csr/KnowlesPHDJ13 share record
persistent URL:
William Knowles , Daniel Prince , David Hutchison , Jules Ferdinand Pagna Disso , Kevin Jones : Towards Real-Time Assessment of Industrial Control Systems (ICSs): A Framework for Future Research. ICS-CSR 2013 share record
persistent URL:
Antoine Lemay , José M. Fernandez , Scott Knight : An isolated virtual cluster for SCADA network security research. ICS-CSR 2013 share record
persistent URL:
Thomas H. Morris , Wei Gao : Industrial Control System Cyber Attacks. ICS-CSR 2013 export record
dblp key:
conf/ics-csr/NicholsonJW13 share record
persistent URL:
Andrew Nicholson , Helge Janicke , Tim Watson : An Initial Investigation into Attribution in SCADA Systems. ICS-CSR 2013 share record
persistent URL:
Robert F. Oates , Fran Thom , Graham Herries : Security-Aware, Model-Based Systems Engineering with SysML. ICS-CSR 2013 share record
persistent URL:
Michael Robinson : The SCADA Threat Landscape. ICS-CSR 2013 share record
persistent URL:
Amit Soni , Sye Loong Keoh , Sandeep S. Kumar , Oscar García Morchon : HADA: Hybrid Access Decision Architecture for Building Automation and Control Systems. ICS-CSR 2013 share record
persistent URL:
Khan Ferdous Wahid , Nicolai Kuntze , Carsten Rudolph : Trusted Virtual Machine Management for Virtualization in Critical Environments. ICS-CSR 2013 share record
persistent URL:
Tina Wu , Jules Ferdinand Pagna Disso , Kevin Jones , Adrian Campos : Towards a SCADA Forensics Architecture. ICS-CSR 2013 export record
dblp key:
conf/ics-csr/YasakethuJ13 share record
persistent URL:
S. L. P. Yasakethu , J. Jiang : Intrusion Detection via Machine Learning for SCADA System Protection. ICS-CSR 2013 share record
persistent URL:
Helge Janicke , Kevin I. Jones : 1st International Symposium for ICS & SCADA Cyber Security Research 2013, ICS-CSR 2013, 16-17 September 2013, Leicester, UK. Workshops in Computing , BCS 2013 , ISBN 978-1-780172-32-3 [contents]