2,331
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019) - Index

      Published
      proceedings-article
      , , ,
      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019) (ICS-CSR)
      Cyber Security Research
      10th-12th September 2019
      Bookmark

            Abstract

            Main article text

            Program Committee

            General Conference Chairs

            Kevin Jones, Airbus, UK: kevin.jones@ics-csr.com

            Helge Janicke, De Montfort University, UK: helge.janicke@ics-csr.com

            Thomas Brandstetter, St. Polten UniversityofApplied Sciences, Austria: thomas.brandstetter@123456ics-csr.com

            Organising Chairs

            Leandros Maglaras, DeMontfort University: leandrosmag@123456gmail.com

            Adam Wedgbury, Airbus: adam.wedgbury@123456airbus.com

            Christos Xenakis, University of Piraeus: xenakis@123456unipi.gr

            Richard Smith, DeMontfort University: rgs@123456dmu.ac.uk

            Organising Committee

            Web Chair: Robert Luh (St. Polten University ofApplied Sciences): robert.luh@123456fhstp.ac.at

            Publication Chair: Leandros Maglaras (De Montfort Universtiy)

            Workshop Chair: Adam Wedgbury (Airbus), Joanne Barwick (DeMontfort University)

            Special Session Chairs

            Ulrik Franke, (RISE SICS -Swedish Institute of Computer Science, Sweden)

            Paul Smith (AIT, Austria)

            Kieran McLaughlin (Queen's University Belfast, UK)

            Technical Programme Committee (TPC)

            Ahmin Ahmed, University of Larbi Tebessi

            Jo Barwick, De Montfort University

            Jens Braband, Siemens AG

            Thomas Brandstetter, Limes Security / St. Polten University of Applied Sciences

            Periklis Chatzimisios, Alexander Technological Educational Institute of Thessaloniki

            Tiago Cruz, University of Coimbra

            Abdelouahid Derhab, King Saud University

            George Drivas, University of Piraeus

            Christian Facchi, Technische Hochschule Ingolstadt

            Jose M. Fernandez, Ecole Polytechnique de Montreal

            Mohamed Amine Ferrag, Guelma University

            Patrick Francis, Airbus Defence and Space Limited

            Ulrik Franke, RISE

            Peter Fuhr, Oak Ridge National Laboratory

            Erol Gelenbe, Imperial College London

            Bela Genge, Petru Maior University of Tg Mures, Romania

            Dieter Gollmann, Hamburg University of Technology

            Piroska Haller, Petru Maior University

            Chris Hankin, Imperial College London

            David Hutchison, Lancaster University

            Sotiris Ioannidis, FORTH

            Chris Johnson, University of Glasgow

            Kevin Jones, Airbus Group

            Athanasios Kakarountas, University of Thessaly

            Christos Kalloniatis, Department of Cultural Technology and Communication, University of the Aegean

            Vasilios Katos, Bournemouth University

            Panayiotis Kotzanikolaou, University of Piraeus

            Antoine Lemay, Ecole Polytechnique de Montreal

            Eireann Leverett, Concinnity Risks

            Shujun Li, University of Kent

            Robert Luh, St. Polten University of Applied Sciences

            Leandros Maglaras, De Montfort University

            Ioannis Mavridis, Department of Applied Informatics, University of Macedonia

            Peter Maynard, CSiT

            Kieran Mclaughlin, CSIT

            Edmundo Monteiro, University of Coimbra

            Thomas Morris, The University of Alabama in Huntsville

            Sotiris Moschoyiannis, University of Surrey

            Konstantinos Moulinos, European Network & Information Security Agency

            Mithun Mukherjee, Guangdong University of Petrochemical Technology

            Robert Oates, Rolls-Royce

            Jules Ferdinand Pagna Disso, EADS

            Simon Parksinson, University of Huddersfield

            Stephan Reiff-Marganiec, Department of Computer Science, University of Leicester

            Michael Rossberg, Technische Universitaet Ilmenau

            Howard Shrobe, Massachusetts Institute of Technology

            Paulo Simoes, University of Coimbra

            Florian Skopik, AIT Austrian Institute of Technology

            Paul Smith, AIT Austrian Institute of Technology

            Richard Smith, De Montfort University

            Paul Smith, AIT Austrian Institute of Technology

            Adriano Valenzano, IEIIT/CNR

            Vasileios Vlachos, University of Thessaly

            Adam Wedgbury, Airbus Group

            Stephen D. Wolthusen, Royal Holloway, University of London

            Christos Xenakis, University of Piraeus

            Papers:

            Felix Sauer, Matthias Niedermaier, Susanne KieGling, Dominik Merli LICSTER - A Low-cost ICS Security Testbed for Education and Research http://dx.doi.org/10.14236/ewic/ICSCSR2019.1

            Angela Smith, Adam Wedgbury, Philippe Biondi, Hugh Soulsby, Kevin Jones Industrial Control System Defence: Debugging ICS Maintenance Network Traffic http://dx.doi.org/10.14236/ewic/ICSCSR2019.2

            Petr Matousek, Ondrej Rysavy, Matej Gregr Increasing Visibility of IEC 104 Communication in the Smart Grid http://dx.doi.org/10.14236/ewic/ICSCSR2019.3

            Dimitrios Schoinianakis, Norbert Goetze, Gerald Lehmann MDiET: Malware Detection in Encrypted Traffic http://dx.doi.org/10.14236/ewic/ICSCSR2019.4

            Abdelouahid Derhab, Mohamed Guerroumi, Leandros Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan BLOSTER: Blockchain-based System for Detection of Fraudulent Rules in Software-Defined Networks http://dx.doi.org/10.14236/ewic/ICSCSR2019.5

            Philipp Kreimel, Paul Tavolato Neural Net-Based Anomaly Detection System in Substation Networks http://dx.doi.org/10.14236/ewic/ICSCSR2019.6

            Martin Barrere, Chris Hankin, Demetrios G. Eliades, Nicolas Nicolaou, Thomas Parisini Assessing Cyber-Physical Security in Industrial Control Systems http://dx.doi.org/10.14236/ewic/ICSCSR2019.7

            George Suciu, Cristiana-Ioana Istrate, Ruxandra Ioana Raducanu, Maria-Cristina Ditu, Octavian Fratu, Alexandru Vulpe Mobile devices forensic platform for malware detection http://dx.doi.org/10.14236/ewic/ICSCSR2019.8

            George Suciu, Cristiana-Ioana Istrate, Alexandru Vulpe, Mari-Anais Sachian, Marius Vochin, Aristeidis Farao, Christos Xenakis Attribute-based Access Control for Secure and Resilient Smart Grids http://dx.doi.org/10.14236/ewic/ICSCSR2019.9

            Aristeidis Farao, Christoforos Ntantogian, Cristiana Istrate, George Suciu, Christos Xenakis SealedGRID: Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID http://dx.doi.org/10.14236/ewic/ICSCSR2019.10

            Muhammad Taimoor Khan, Dimitrios Serpanos, Howard Shrobe On Synthesis of Runtime Security Monitor for Real-time IoT Applications http://dx.doi.org/10.14236/ewic/ICSCSR2019.11

            Henry Hui, Peter Maynard, Kieran McLaughlin ICS Interaction Testbed: A Platform for Cyber-Physical Security Research http://dx.doi.org/10.14236/ewic/ICSCSR2019.12

            Vasileios Vlachos, Yannis C. Stamatiou, Pantelis Tzamalis, Sotiris Nikoletseas, Kyriaki Chantzi A Social Network Analysis Tool for Uncovering Cybersecurity Threats http://dx.doi.org/10.14236/ewic/ICSCSR2019.13

            Soo Yee Lim, Joseph Gardiner, Barnaby Craggs, Awais Rashid RESTful HTTPS over Zigbee: Why and how? http://dx.doi.org/10.14236/ewic/ICSCSR2019.14

            Mohammed Al Qurashi, Constantinos Marios Angelopoulos, Vasilios Katos Efficient Intrusion Detection in Ad-Hoc Networks http://dx.doi.org/10.14236/ewic/ICSCSR2019.15

            Mohamed Amine Ferrag, Leandros Maglaras, Helge Janicke, Richard Smith Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis http://dx.doi.org/10.14236/ewic/ICSCSR2019.16

            Ghada Elbez, Hubert B. Keller, Veit Hagenmeyer Authentication ofGOOSE Messages underTiming Constraints in IEC 61850 Substations http://dx.doi.org/10.14236/ewic/ICSCSR2019.17

            Peter L. Fuhr A Separate Network for Control System CyberSecurity http://dx.doi.org/10.14236/ewic/ICSCSR2019.18

            Author and article information

            Conference
            September 2019
            September 2019
            Article
            10.14236/ewic/ICSCSR2019.0
            2881fa2a-a32e-486c-897a-39014965f783
            Copyright @ 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR 2019)
            ICS-CSR
            6
            Athens, Greece
            10th-12th September 2019
            Electronic Workshops in Computing (eWiC)
            Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction

            Comments

            Comment on this article