ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
19
views
11
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,023
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
other
Author(s):
Ron Bitton
,
Tomer Gluck
,
Orly Stan
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Yoshiyuki Yamada
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
Publication date
(Online):
August 08 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Digital Twin: Mitigating Unpredictable, Undesirable Emergent Behavior in Complex Systems
Michael Grieves
,
John Vickers
(2017)
0
comments
Cited
135
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A survey of intrusion detection techniques for cyber-physical systems
Ing-Ray Chen
,
Robert Mitchell
(2014)
0
comments
Cited
68
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The Cybersecurity Landscape in Industrial Control Systems
Stephen R McLaughlin
,
Charalambos Konstantinou
,
Xueyang Wang
…
(2016)
0
comments
Cited
25
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 08 2018
Pages
: 533-554
DOI:
10.1007/978-3-319-99073-6_26
SO-VID:
16c02679-9b22-482e-b171-454f1c8c90ee
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM
pp. 26
On Leveraging Coding Habits for Effective Binary Authorship Attribution
pp. 48
Synthesis of a Permissive Security Monitor
pp. 66
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries
pp. 87
Strain: A Secure Auction for Blockchains
pp. 111
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
pp. 132
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews
pp. 152
Efficient Proof Composition for Verifiable Computation
pp. 175
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
pp. 197
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC
pp. 218
How Secure Is Green IT? The Case of Software-Based Energy Side Channels
pp. 243
Phishing Attacks Modifications and Evolutions
pp. 263
SILK-TV: Secret Information Leakage from Keystroke Timing Videos
pp. 305
Beneath the Bonnet: A Breakdown of Diagnostic Security
pp. 325
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
pp. 346
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets
pp. 363
PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security Applications
pp. 385
POR for Security Protocol Equivalences
pp. 406
Automated Identification of Desynchronisation Attacks on Shared Secrets
pp. 427
Stateful Protocol Composition
pp. 470
Anonymous Single-Sign-On for n Designated Services with Traceability
pp. 491
Efficiently Deciding Equivalence for Standard Primitives and Phases
pp. 512
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor
pp. 533
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
pp. 555
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics
pp. 575
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
pp. 595
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices
Similar content
2,023
Three-Input Single-Output Voltage-Mode Multifunction Filter with Electronic Controllability Based on Single Commercially Available IC
Authors:
Dusit Thanapatay
,
Winai Jaikla
,
Supachai Klungtong
Components: Microprocessors galore: Advances in logic, memories, microprocessors, and linear ICs give new capabilities to device users
Authors:
Roger Allan
Finite group extensions of shifts of finite type: K-theory, Parry and Liv\v{s}ic
Authors:
Mike Boyle
,
Scott Schmieding
See all similar
Cited by
8
Characterising the Digital Twin: A systematic literature review
Authors:
David Jones
,
Chris Snider
,
Aydin Nassehi
…
Digital Twins in Livestock Farming
Authors:
Suresh Neethirajan
,
Bas Kemp
Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins
Authors:
Sabah Suhail
,
Saif Ur Rehman Malik
,
Raja Jurdak
…
See all cited by