295
views
0
recommends
+1 Recommend
1 collections
    8
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018) - Index

      proceedings-article
      , ,
      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018) (ICS-CSR)
      Cyber Security Research
      29 - 30 August 2018
      Bookmark

            Abstract

            The 5th International Symposium for ICS & SCADA Cyber Security brings together researchers with an interest in the security of industrial control systems in the light of their increasing exposure to cyber-space. The topics of interests are broad, ranging from security for hardware/firmware used in industrial control systems, to system aspects of ICS such as secure architectures and vulnerability screening to the human aspects of cyber security such as behaviour modelling and training. ICS-CSR is a research conference aimed at high quality academic research in any of the specified themes and topics of interest. We welcome original contributions that present innovative ideas, proof of concepts, use cases, and results from a variety of domains with a wish to enhance the security of infrastructure.

            Research Themes and Topics of Interest:

            ICS-CSR is welcoming contributions that have a direct application or relevance to security aspects of Distributed Control Systems (DCS), Supervisory Control and Data Acquisition Systems (SCADA), Industrial Control Systems (ICS), Cyber Physical Systems (CPS), Industrial Internet of Things (IIoT), Smart City, or Industry 4.0.

            Main article text

            Papers:

            Wouter Depamelaere, Laurens Lemaire, Jan Vossaert & Vincent Naessens CPS Security Assessment using automatically generated attack trees http://dx.doi.org/10.14236/ewic/ICSCSR2018.1

            Amin Hassanzadeh & Robin Burkett SAMIIT: Spiral Attack Modal in IIoT Mapping Security Alerts to Attack Life Cycle Phases http://dx.doi.org/10.14236/ewic/ICSCSR2018.2

            Matthias Niedermaier, Thomas Hanka, Sven Plaga, Alexander von Bodisco & Dominik Merli Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation http://dx.doi.org/10.14236/ewic/ICSCSR2018.3

            Gorby Kabasele Ndonda & Ramin Sadre A Two-level Intrusion Detection System for Industrial Control System Networks using P4 http://dx.doi.org/10.14236/ewic/ICSCSR2018.4

            Robert Terruggia, Giovanna Dondossola & Mathias Ekstedt Cyber security analysis of Web-of-Cells energy architectures http://dx.doi.org/10.14236/ewic/ICSCSR2018.5

            Oliver Eigner, Philipp Kreimel & Paul Tavolato Identifying S7comm Protocol Data Injection Attacks in Cyber-Physical Systems http://dx.doi.org/10.14236/ewic/ICSCSR2018.6

            Yatin Wadhawan, Clifford Neuman & Anas AlMajali PSP: A Framework to Allocate Resources to Power Storage Systems under Cyber-Physical Attacks http://dx.doi.org/10.14236/ewic/ICSCSR2018.7

            Henry Hui & Kieran McLaughlin Investigating Current PLC Security Issues Regarding Siemens S7 Communication and TIA Portal http://dx.doi.org/10.14236/ewic/ICSCSR2018.8

            K. Koumidis, P. Kolios & C G Panayiotou Optimizing Blockchain for data integrity in Cyber Physical Systems http://dx.doi.org/10.14236/ewic/ICSCSR2018.9

            Rishabh Das, Vineetha Menon & Thomas H. Morris On the Edge Realtime Intrusion Prevention System for DoS Attack http://dx.doi.org/10.14236/ewic/ICSCSR2018.10

            Peter Maynard, Kieran McLaughlin & Sakir Sezer An Open Framework for Deploying Experimental SCADA Testbed Networks http://dx.doi.org/10.14236/ewic/ICSCSR2018.11

            Mislav Findrik, Paul Smith, Kevin Quill & Kieran McLaughlin PLCBlockMon: Data Logging and Extraction on PLCs for Cyber Intrusion Detection http://dx.doi.org/10.14236/ewic/ICSCSR2018.12

            Justyna J. Chromik, Anne Remke & Boudewijn R. Haverkort Bro in SCADA: dynamic intrusion detection policies based on a system model http://dx.doi.org/10.14236/ewic/ICSCSR2018.13

            Author and article information

            Contributors
            Conference
            August 2018
            August 2018
            Article
            10.14236/ewic/ICSCSR2018.0
            f69cac3a-2282-4b2f-8941-757283d314cd

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)
            ICS-CSR
            5
            University of Hamburg, Germany
            29 - 30 August 2018
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article