1,947
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016) - Index

      proceedings-article
      , ,
      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016) (ICS-CSR)
      Cyber Security Research
      23 - 25 August 2016
      Bookmark

            Abstract

            The 4th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest.

            Main article text

            Papers:

            Andrew Fielder, Tingting Li & Chris Hankin Defense-in-depth vs. Critical Component Defense for Industrial Control Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.1

            Rob Antrobus, Sylvain Frey, Awais Rashid & Benjamin Green SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.2

            Ivo Friedberg, Kieran McLaughlin, Paul Smith & Markus Wurzenberger Towards a Resilience Metric Framework for Cyber-Physical Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.3

            Antoine Lemay, Jonathan Rochon & José M. Fernandez A Practical flow white list approach for SCADA systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.4

            Christopher Tebbe, Karl-Heinz Niemann & Alexander Fay Ontology and life cycle of knowledge for ICS security assessments http://dx.doi.org/10.14236/ewic/ICSCSR2016.5

            Manuel Cheminod, Luca Durante, Marcello Maggiora, Adriano Valenzano & Claudio Zunino Performance of Firewalls for Industrial Applications http://dx.doi.org/10.14236/ewic/ICSCSR2016.6

            Rafiullah Khan, Peter Maynard, Kieran McLaughlin, David Laverty & Sakir Sezer Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid http://dx.doi.org/10.14236/ewic/ICSCSR2016.7

            Jan Wolf, Felix Wiezorek, Frank Schiller, Gerhard Hansch, Norbert Wiedermann & Martin Hutle Adaptive Modelling for Security Analysis of Networked Control Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.8

            Sarita Paudel, Paul Smith & Tanja Zseby Data Integrity Attacks in Smart Grid Wide Area Monitoring http://dx.doi.org/10.14236/ewic/ICSCSR2016.9

            Allan Cook, Richard Smith, Leandros Maglaras & Helge Janicke Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure http://dx.doi.org/10.14236/ewic/ICSCSR2016.10

            Elisa Canzani, Helmut Kaufmann & Ulrike Lechner Characterising Disruptive Events to Model Cascade Failures in Critical Infrastructures http://dx.doi.org/10.14236/ewic/ICSCSR2016.11

            Allan Cook, Richard Smith, Leandros Maglaras & Helge Janicke Measuring the Risk of Cyber Attack in Industrial Control Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.12

            Justyna J. Chromik, Anne Remke & Boudewijn R. Haverkort Improving SCADA security of a local process with a power grid model http://dx.doi.org/10.14236/ewic/ICSCSR2016.13

            BooJoong Kang, Kieran McLaughlin & Sakir Sezer Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection http://dx.doi.org/10.14236/ewic/ICSCSR2016.14

            Andrew Wain, Stephen Reiff-Marganiec, Kevin Jones & Helge Janicke Towards a Distributed Runtime Monitor for ICS/SCADA Systems http://dx.doi.org/10.14236/ewic/ICSCSR2016.15

            Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby & Kristan Stoddart Forensic Readiness for SCADA/ICS Incident Response http://dx.doi.org/10.14236/ewic/ICSCSR2016.16

            Gundars Kalns, Simin Nadjm-Tehrani & Maria Vasilevskaya Trading off Latency Against Security in Open Energy Metering Infrastructures http://dx.doi.org/10.14236/ewic/ICSCSR2016.17

            Author and article information

            Contributors
            Conference
            August 2016
            August 2016
            Article
            10.14236/ewic/ICSCSR2016.0
            652dbb49-7968-44c5-9c02-00531ee25060
            Copyright @ 2016

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016)
            ICS-CSR
            4
            Queen's Belfast University, UK
            23 - 25 August 2016
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article