Papers:
Laurens Lemaire, Jan Vossaert, Joachim Jansen & Vincent Naessens Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System http://dx.doi.org/10.14236/ewic/ICSCSR2015.1
Roman Schlegel, Sebastian Obermeier & Johannes Schneider Assessing the Security of IEC 62351 http://dx.doi.org/10.14236/ewic/ICSCSR2015.2
Alexandru Vlad Serbanescu, Sebastian Obermeier & Der-Yeuan Yu ICS Threat Analysis Using a Large-Scale Honeynet http://dx.doi.org/10.14236/ewic/ICSCSR2015.3
Tingting Li & Chris Hankin A Model-based Approach to Interdependency between Safety and Security in ICS http://dx.doi.org/10.14236/ewic/ICSCSR2015.4
Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones & Kristan Stoddart A Forensic Taxonomy of SCADA Systems and Approach to Incident Response http://dx.doi.org/10.14236/ewic/ICSCSR2015.5
Ivo Friedberg, David Laverty, Kieran McLaughlin & Paul Smith A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation http://dx.doi.org/10.14236/ewic/ICSCSR2015.6
Manuel Cheminod, Luca Durante, Lucia Seno & Adriano Valenzano Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts http://dx.doi.org/10.14236/ewic/ICSCSR2015.7
Adam Wedgbury & Kevin Jones Automated Asset Discovery in Industrial Control Systems - Exploring the Problem http://dx.doi.org/10.14236/ewic/ICSCSR2015.8
Giuseppe Settanni, Florian Skopik, Helmut Kaufmann, Tobias Gebhardt, Klaus Theuerkauf, Konstantin Boettinger, Mark Carolan, Damien Conroy & Pia Olli A Blueprint for a Pan-European Cyber Incident Analysis System http://dx.doi.org/10.14236/ewic/ICSCSR2015.9
Johannes Schneider, Sebastian Obermeier & Roman Schlegel Cyber Security Maintenance for SCADA Systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.10
Ying He & Helge Janicke Towards Agile Industrial Control Systems Incident Response http://dx.doi.org/10.14236/ewic/ICSCSR2015.11
Christoph Lang-Muhr, Matthias Schrattenholzer & Paul Tavolato Multi-Layer Agent-Based Simulation of Network Behaviour in Advanced Metering Infrastructures http://dx.doi.org/10.14236/ewic/ICSCSR2015.12
Grigoris Tzokatziou, Leandros Maglaras & Helge Janicke Insecure by Design: Using Human Interface Devices to exploit SCADA systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.13
Cordell C. Davidson, Joel Dawson, Paul Carsten, Mark Yampolskiy & Todd R. Andel Investigating the Applicability of a Moving Target Defense for SCADA systems http://dx.doi.org/10.14236/ewic/ICSCSR2015.14
Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey T. McDonald & Samuel Russ A System to Recognize Intruders in Controller Area Network (CAN) http://dx.doi.org/10.14236/ewic/ICSCSR2015.15