Journal Articles 2018(1 publication) [publication]J. Proenca and Simões, P. and Tiago Cruz and Edmundo Monteiro , "Virtualization of Residential Gateways: A Comprehensive Survey", IEEE Communications Surveys Tutorials, vol. 21, pp. 1462-1482, 2018 [citation][year=2019]Daniel Temp and Rodrigo Mansilha and Deivid Rodrigues and Diego Kreutz, Rumo á Delegação Escalável e Segura de Gerenciamento de LANs para ISPs, 17ª Escola Regional de Redes de Computadores, 16-19 setembro, 2019. Alegrete-RS, Brasil. Available at: http://errc.sbc.org.br/2019/papers/temp2019rumo.pdf [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 2016(2 publications) [publication]Tiago Cruz and Rosa, L. and J. Proenca and Maglaras, L. and Aubigny, M. and Lev, L. and Jiang, J. and Simões, P. , "A Cyber Security Detection Framework for Supervisory Control and Data Acquisition Systems", IEEE Transactions on Industrial Informatics, ISSN (print): 1551-3203, ISSN (electronic): 1941-0050, vol. 12, pp. 1-11, 2016 [citation][year=2020]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks Against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1035-1044, Feb. 2020. DOI: 10.1109/TII.2019.2926557 [citation][year=2020]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 1024-1034, Feb. 2020. doi: 10.1109/TII.2019.2925422 [citation][year=2020]LUO, Junzhou & HE, Yuan & ZHANG, Lan & LIU, Liang & SUN, Maojie & XIONG, Runqun & DONG, Fang. (2020). The architecture and key technologies for an industrial Internet with synergy between the cloud and clients. SCIENTIA SINICA Informationis. 50. 195-220. DOI: 10.1360/N112019-00005. [citation][year=2020]Soumya Ray*, Kamta Nath Mishra and Sandip Dutta, “Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review”, Recent Advances in Computer Science and Communications (2020) 13: 1. https://doi.org/10.2174/2666255813666200224092717 [citation][year=2020]Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian, "Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review", arXiv:2003.00395v1, March 2020 [citation][year=2020]Claudio Zunino, Adriano Valenzano, Roman Obermaisser, Stig Petersen, Factory Communications at the Dawn of the Fourth Industrial Revolution, Computer Standards & Interfaces, Volume 71, 2020, ISSN 0920-5489, DOI: 10.1016/j.csi.2020.103433. [citation][year=2020]L. Ding, Q. Han, B. Ning and D. Yue, "Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks," in IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4909-4919, July 2020. [citation][year=2020]Jakapan Suaboot, Adil Fahad, Zahir Tari, John Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, and Khalil Drira. 2020. A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53, 2, Article 40 (April 2020), 37 pages. https://doi.org/10.1145/3379499 [citation][year=2019]Lin, L.; Wang, B.; Qi, J.; Wang, D.; Huang, N. Bearing Fault Diagnosis Considering the Effect of Imbalance Training Sample. Entropy 2019, 21, 386. DOI: 10.3390/e21040386 [citation][year=2019]Will Serrano, Erol Gelenbe, "Deep Learning Clusters in the Cognitive Packet Network", Neurocomputing, 2019, ISSN 0925-2312. DOI: 10.1016/j.neucom.2018.07.101. [citation][year=2019]Jiwoong Kang, Taein Kim, Jaehyun Park, "FPGA-based Real-time Abnormal Packet Detector for Critical Industrial Network", in Proc. of 2019 Workshop on Communications in Critical Embedded Systems (as part of IEEE ISCC 2019), june 30, 2019, Barcelona, Spain. DOI: 10.1109/ISCC47284.2019.8969630 [citation][year=2019]Venkataramanan, Venkatesh & Srivastava, Anurag & Hahn, Adam. (2019). CyPhyR: A Cyber-Physical Analysis Tool for Measuring and Enabling Resiliency in Microgrids. IET Cyber-Physical Systems: Theory & Applications. DOI: 10.1049/iet-cps.2018.5069. [citation][year=2019]Z. Han, X. Li, G. Xu, N. Xiong, E. Merlo and E. Stroulia, "An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2925422 [citation][year=2019]J. Yang, C. Zhou, Y. Tian and S. Yang, "A Software-defined Security Approach for Securing Field Zones in Industrial Control Systems," in IEEE Access, 2019. doi: 10.1109/ACCESS.2019.2924800 [citation][year=2019]Qi Min, "Research on the Importance of Maintaining Network Ideology Security in the Context of Globalization", in Proc. of 2019 4th International Social Sciences and Education Conference (ISSEC 2019) , Xiamen, China, 27-28 june 2019. Available at: https://www.webofproceedings.org/proceedings_series/ESSP/ISSEC 2019/ISSEC19040.pdf [citation][year=2019]M. Bahrami, M. Fotuhi-Firuzabad and H. Farzin, "Reliability Evaluation of Power Grids Considering Integrity Attacks against Substation Protective IEDs," in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2019.2926557 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically-Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," in IEEE Transactions on Industrial Informatics ,2019. DOI: 10.1109/TII.2019.2936298 [citation][year=2019]Y. Liu, A. Liu, X. Liu and M. Ma, "A Trust-based Active Detection for Cyber-physical Security in Industrial Environments," in IEEE Transactions on Industrial Informatics, 2019. doi: 10.1109/TII.2019.2931394 [citation][year=2019]D. A. Noby and A. Khattab, "A Survey of Blockchain Applications in IoT Systems," 2019 14th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2019, pp. 83-87. DOI: 10.1109/ICCES48960.2019.9068170 [citation][year=2019]H. F. M. de Figueiredo, M. K. Ferst and G. W. Denardin, "An Overview About Detection of Cyber-Attacks on Power SCADA Systems," 2019 IEEE 15th Brazilian Power Electronics Conference and 5th IEEE Southern Power Electronics Conference (COBEP/SPEC), Santos, Brazil, 2019, pp. 1-6. DOI: 10.1109/COBEP/SPEC44138.2019.9065353 [citation][year=2019]D. Sun, G. Zhang and S. Gao, "Data Management across Geographically Distributed Autonomous Systems: Architecture, Implementation, and Performance Evaluation," 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 2019, pp. 2284-2292. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00317 [citation][year=2019]Henry Hui , Peter Maynard , Kieran McLaughlin, "ICS Interaction Testbed: A Platform for Cyber-Physical Security Research", in proc of 6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR), September 2019. DOI: 10.14236/ewic/icscsr19.12 [citation][year=2019]A. Li et al., "BCRAM: A Social-Network-Inspired Breast Cancer Risk Assessment Model," in IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 366-376, Jan. 2019. doi: 10.1109/TII.2018.2825345 [citation][year=2019]L. Lu, H. J. Liu, H. Zhu and C. Chu, "Intrusion Detection in Distributed Frequency Control of Isolated Microgrids," in IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 6502-6515, Nov. 2019. doi: 10.1109/TSG.2019.2906573 [citation][year=2019]Yin, Xiaochun & Liu, Zeng & Nkenyereye, Lewis & Ndibanje, Bruce. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors. 19. 4952. 10.3390/s19224952. [citation][year=2019]Hongwen Hui, Xingshuo An, Haoyu Wang, Weijia Ju, Huixuan Yang, Hongjie Gao, and Fuhong Lin, “Survey on Blockchain for Internet of Things”, Journal of Internet Services and Information Security (JISIS), 9(2): 1-30, May 2019, DOI: 10.22667/JISIS.2019.05.31.001 [citation][year=2019]Yong Chen, A Survey on Industrial Information Integration 2016-2019, in Journal of Industrial Integration and Management, DOI: 10.1142/S2424862219500167 [citation][year=2018]P. M. Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3314-3324, Aug. 2018. doi: 10.1109/TII.2017.2781285 [citation][year=2018]X. Li, C. Zhou, Y. Tian and Y. Qin, "A Dynamic Decision-Making Approach for Intrusion Response in Industrial Control Systems," in IEEE Transactions on Industrial Informatics, August 2018. doi: 10.1109/TII.2018.2866445 [citation][year=2018]Zeng P., Zhou P. (2018) Intrusion Detection in SCADA System: A Survey. In: Li K., Fei M., Du D., Yang Z., Yang D. (eds) Intelligent Computing and Internet of Things. ICSEE 2018, IMIOT 2018. Communications in Computer and Information Science, vol 924. Springer, Singapore. DOI: 10.1007/978-981-13-2384-3_32 [citation][year=2018]Ming Wan, Yan Song, Yuan Jing, and Junlu Wang, “Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication,” Security and Communication Networks, vol. 2018, Article ID 5103270, 11 pages, 2018. https://doi.org/10.1155/2018/5103270. [citation][year=2018]Will Serrano."Deep Learning Cluster Structures for Management Decisions: The Digital CEO". Sensors. 18. 3327. DOI: 10.3390/s18103327. 2018. [citation][year=2018]Amin Mansouri, Babak Majidi & Abdolah Shamisa (2018) Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures, International Journal of Computers and Applications, DOI: 10.1080/1206212X.2018.1533613 [citation][year=2018]Serrano W. (2019) The Cognitive Packet Network with QoS and Cybersecurity Deep Learning Clusters. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2018. Advances in Intelligent Systems and Computing, vol 868. Springer, Cham. Volume 1. 62-85. DOI: 10.1007/978-3-030-01054-6_5. [citation][year=2018]Mohamed Najeh Lakhoua, "Cyber Security of SCADA Network in Thermal Power Plants", in Proc of Conference: 2018 International Conference on Smart Communications and Networking (SmartNets), November 2018. DOI: 10.1109/SMARTNETS.2018.8707398 [citation][year=2018]Weize Li, Lun Xie, and Zhiliang Wang, “A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression,” Journal of Electrical and Computer Engineering, vol. 2018, Article ID 7204939, 14 pages, 2018. doi:10.1155/2018/7204939 [citation][year=2018]Kim, Junsik, and Jaehyun Park. "FPGA-based network intrusion detection for IEC 61850-based industrial network." ICT Express (2018). DOI: 10.1016/j.icte.2018.01.002 [citation][year=2018]Shama N. Islam, M.A. Mahmud, A.M.T. Oo, Impact of optimal false data injection attacks on local energy trading in a residential microgrid, ICT Express, Available online 21 February 2018, ISSN 2405-9595, https://doi.org/10.1016/j.icte.2018.01.015. [citation][year=2018]Li X., Wang G., Ali S., He Q. (2018) Android Malware Detection Using Category-Based Permission Vectors. In: Vaidya J., Li J. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science, vol 11337. Springer, Cham. DOI: 10.1007/978-3-030-05063-4_31 [citation][year=2018]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, "Significant Permission Identification for Machine-Learning-Based Android Malware Detection," in IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216-3225, July 2018. doi: 10.1109/TII.2017.2789219 [citation][year=2018]Varun Mohta, Zhipeng Zhao, Michael Sylvester Pukish, "Real-time anomaly detection in a network using state transitions", Patent Grant US-10050987-B1. Publication date: 2018/08/14. Available at: https://patents.google.com/patent/US10050987B1/en [citation][year=2017]Yufei Liu, De-Chang Pi, and Cui Lin, Mining Community-level Influence in Microblogging Network: A Case Study on Sina Weibo, Hindawi/Wiley Complexity, Received 7 June 2017; Accepted 12 November 2017. Availablle at: https://www.hindawi.com/journals/complexity/aip/4783159/ [citation][year=2017]Q. Niyaz, W. Sun, A. Javaid, "A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)", EAI Endorsed Transactions on Security and Safety 17(12): e2, published on the 28 dez 2017. DOI: 10.4108/eai.28-12-2017.153515 [citation][year=2017]Mohamed Najeh, Lakhoua, "Review on SCADA Cybersecurity for Critical Infrastructures". Journal of Computer Science & Control Systems. May2017, Vol. 10 Issue 1, p15-18. 4p. [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf [citation][year=2017]Lei Yang, Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 17(10): e5, EAI, 2017, DOI: 10.4108/eai.1-2-2017.152156. [publication]Tiago Cruz and Queiroz, R. and J. Proenca and Simões, P. and Edmundo Monteiro , "Leveraging Virtualization Technologies to Improve SCADA ICS Security", Journal of Information Warfare. Vol. 15, No. 3 (2016), pp. 81-100 - ISSN 1445-3312 (print)/ISSN 1445-334, vol. 15, 2016 [citation][year=2017]Hallman, R., Bryan, J., Palavicini, G., Divita, J. and Romero-Mariona, J., "IoDDoS — The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.", In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), pages 47-58, ISBN: 978-989-758-245-5 2015(1 publication) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , " Improving Cyber-Security Awareness on Industrial Control Systems: The CockpitCI Approach", Journal of Information Warfare, Vol. 13, No. 4 (2014), pp. 27-41 - ISSN 1445 3347 (online) / ISSN 445-3312 (printed), vol. 13, 2015 [citation][year=2020]Sufang, W. An adaptive ensemble classification framework for real-time data streams by distributed control systems. Neural Comput & Applic (2020). https://doi.org/10.1007/s00521-020-04759-0 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Distributed Multi-Agent Framework for Resilience Enhancement in Cyber-Physical Systems," in IEEE Access. March 2019. doi: 10.1109/ACCESS.2019.2903629 [citation][year=2019]Konstantinos Demertzis, Lazaros Iliadis, Panayiotis Kikiras, Nikos Tziritas (2019). Cyber-Typhon: An Online Multi-task Anomaly Detection Framework. in book: Artificial Intelligence Applications and Innovations, 15th IFIP WG 12.5 International Conference, AIAI 2019, Hersonissos, Crete, Greece, May 24–26, 2019, Proceedings. DOI: 10.1007/978-3-030-19823-7_2 [citation][year=2019]F. Januário, A. Cardoso and P. Gil, "A Multi-Agent Middleware for Resilience Enhancement in Heterogeneous Control Systems," 2019 IEEE International Conference on Industrial Technology (ICIT), Melbourne, Australia, 2019, pp. 988-993. DOI: 10.1109/ICIT.2019.8755011 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2018]Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Ma?lanka, Cybersecurity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection, Available online 20 July 2017, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2017.07.002. (http://www.sciencedirect.com/science/article/pii/S1874548216300324) [citation][year=2016]F. Januário, C. Carvalho, A. Cardoso and P. Gil, "Security challenges in SCADA systems over Wireless Sensor and Actuator Networks," 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Lisbon, Portugal, 2016, pp. 363-368. doi: 10.1109/ICUMT.2016.7765386 2014(1 publication) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Maglaras, L. , "A Distributed IDS for Industrial Control Systems", International Journal of Cyber Warfare and Terrorism, vol. 4, pp. 1-22, 2014 [citation][year=2017]Jacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Maslanka, Cyberse- ´ curity protection for power grid control infrastructures, International Journal of Critical Infrastructure Protection (2017), doi: 10.1016/j.ijcip.2017.07.002 [citation][year=2017]Lamba, Anil & Singh, Satinderjeet & Singh, Balvinder & Dutta, Natasha & Sai, Sivakumar & Muni, Rela. (2017). MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS), International Journal For Technological Research In Engineering, Proc. of 3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science(ETEBMS), July 2017. Available at: https://www.ijtre.com/images/scripts/16214.pdf Conference Articles 2017(2 publications) [publication]J. Proenca and Tiago Cruz and Simões, P. and Gaspar, G. and Parreira, B. and Laranjeira, A. and Bastos, F. , "Building an NFV-Based vRGW: lessons learned", in 14th IEEE Consumer Communications and Networking Conference (CCNC 2017), 2017 [citation][year=2019]Ben Azzouz, Lamia, and Intissar Jamai. "SDN, slicing, and NFV paradigms for a smart home: A comprehensive survey." Transactions on Emerging Telecommunications Technologies, 2019. DOI: 10.1002/ett.3744 [citation][year=2018]P. Wang, F. Ye, X. Chen and Y. Qian, "DataNet: Deep Learning based Encrypted Network Traffic Classification in SDN Home Gateway," in IEEE Access, October 2018. doi: 10.1109/ACCESS.2018.2872430 [publication]Rosa, L. and J. Proenca and João Henriques and Graveto, V. and Tiago Cruz and Simões, P. and Caldeira, F. and Edmundo Monteiro , "An evolved security architecture for distributed Industrial Automation and Control Systems", in In Proc. of 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ISBN: 978-1-911218-43-2, 2017 [citation][year=2018]Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060. 2015(2 publications) [publication]Tiago Cruz and Barrigas, J. and J. Proenca and Graziano, A. and Panzieri, S. and Lev, L. and Simões, P. , "Improving Network Security Monitoring for Industrial Control Systems", in 14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), 2015 [citation][year=2020]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang, PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints, Computers & Security, Volume 92, 2020, 101749, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101749. [citation][year=2020]Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng. 2020. Ransomware Targeting Automobiles. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec ’20). Association for Computing Machinery, New York, NY, USA, 23–29. DOI:https://doi.org/10.1145/3375706.3380558 [citation][year=2019]Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306 [citation][year=2019]T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289 [citation][year=2019]D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019. [citation][year=2019]Khaoula Es-Salhi. Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system. Systems and Control [cs.SY]. Ecole nationale supérieure Mines-Télécom Atlantique, 2019. English. ffNNT : 2019IMTA0143ff. fftel-02298847f. URL: https://tel.archives-ouvertes.fr/tel-02298847/document [citation][year=2019]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946. [citation][year=2019]H. Gao, J. Li and J. Cheng, "Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 289-294. doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00060 [citation][year=2018]Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18 [citation][year=2018]P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018 [citation][year=2018]S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022 [citation][year=2018]Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975 [citation][year=2018]T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591. [citation][year=2018]Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778 [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2017]Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK. [citation][year=2017]P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23 [citation][year=2017]Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4. [citation][year=2017]A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886 [citation][year=2017]Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638 [citation][year=2017]Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6 [citation][year=2017]Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9 [citation][year=2016]Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014 [citation][year=2016]Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/ [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [publication]J. Proenca and Tiago Cruz and Simões, P. and Edmundo Monteiro , "How to use Software-Defined Networking to Improve Security – a Survey", in In Proc. of 14th European Conference on Cyber Warfare and Security (ECCWS 2015). ISBN: 978-1-910810-28-6 ISSN: 2048-8602, 2015 [citation][year=2019]Marzuqi, Oki; Virgono, Agus; Negara, Ridha Muldina. "Implementation model architecture software defined network using raspberry Pi: a review paper" TELKOMNIKA Telecommunication, Computing, Electronics and Control; Yogyakarta Vol. 17, Iss. 3, (Jun 2019): 1136-1141. DOI:10.12928/TELKOMNIKA.v17i3.8859 [citation][year=2019]Soua, Ridha et al. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection, in Proc. of Network of The Future (NoF) conference, Rome, Italy, September 2019. [citation][year=2016]C. Trois; M. D. Didonet Del Fabro; L. C. E. de Bona; M. Martinello, "A Survey on SDN Programming Languages: Towards a Taxonomy," in IEEE Communications Surveys & Tutorials. doi: 10.1109/COMST.2016.2553778 2014(1 publication) [publication]Tiago Cruz and J. Proenca and Simões, P. and Aubigny, M. and Ouedrago, M. and Graziano, A. and Yasakhetu, L. , "Improving cyber-security awareness on Industrial Control Systems: the CockpitCI approach", in In Proc. of 13th European Conference on Information Warfare and Security ECCWS 2014. ISBN: 978-1-63266-831-8 , 2014 [citation][year=2019]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao and Gail-Joon Ahn, "ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems", in Proc. of 7th IEEE Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES 2019), Montreal, Canada, 15 April 2019. [citation][year=2017]Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477 [citation][year=2015]P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5. [citation][year=2015]Gimwoonyeon, yisuyeon, "Foreign industrial control system security technology research and development trends", The Information Security Journal 25, No. 5, 2015.10, 5-11 (7 pages), ISSN : 1598-3978(Print). 2013(2 publications) [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks", in In Proc. of 12th European Conference on Information Warfare and Security (ECIW 2013). ISBN: 978-1-909507-34-0 ISSN: 2048-8602, 2013 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2019]Amine Belqruch and Abdelilah Maach. "SCADA security using SSH honeypot". In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). ACM, New York, NY, USA, Article 2, 5 pages. DOI: https://doi.org/10.1145/3320326.3320328 [citation][year=2019]Maglaras L., Ferrag M.A., Derhab A., Mukherjee M., Janicke H. (2019) Cyber Security: From Regulations and Policies to Practice. In: Kavoura A., Kefallonitis E., Giovanis A. (eds) Strategic Innovative Marketing and Tourism. Springer Proceedings in Business and Economics. Springer, Cham. DOI: 10.1007/978-3-030-12453-3_88 [citation][year=2019]William Hofer, Thomas Edgar, Draguna Vrabie, Katy Nowak “Model-driven Deception for Control System Environments”, in Proc of 2019 IEEE International Symposium onTechnologies for Homeland Security, November 5 - 6, 2019 Woburn, MA USA [citation][year=2018]Maglaras, Leandros & Ferrag, Mohamed Amine & Derhab, Abdelouahid & Mukherjee, Mithun & Janicke, Helge. (2018). Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. Security and Safety. [citation][year=2018]Palleti, V.R., Tan, Y.C., Samavedham, L., A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems, (2018) Journal of Process Control, 68, pp. 160-170. DOI: 10.1016/j.jprocont.2018.05.005 [citation][year=2018]Adam Rose, Noah Miller, Jonathan Eyer, Joshua Banks, (2018). Economic Effectiveness of Mitigation and Resilience. 315-351. 10.1007/978-3-319-77492-3_14. May 2018. [citation][year=2017]Angséus, J., Ekbom, R., "Network-based Intrusion Detection Systems for Industrial Control Systems", Master’s thesis in Computer Systems and Networks (MPCSN), Department of Computer Science and Engineering. CHALMERS UNIVERSITY OF TECHNOLOGY/UNIVERSITY OF GOTHENBURG, Gothenburg, Sweden 2017 [citation][year=2017]Ibraheem Frieslaar and Barry Irwin. 2017. Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable. In Proceedings of the South African Institute of Computer Scientists and Information Technologists (SAICSIT '17). ACM, New York, NY, USA, Article 15, 10 pages. DOI: https://doi.org/10.1145/3129416.3129436 [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016 [citation][year=2016]J. Nurmi, J. Kannisto and M. Vajaranta, "Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet," 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), Fukuoka, Japan, 2016, pp. 55-59. doi: 10.1109/AsiaJCIS.2016.31 [citation][year=2015]Kamil Koltys and Robert Gajewski, SHaPe: A Honeypot for Electric Power Substation, Journal of Telecommunications and Information Technology, 2015, vol. 4, pp. 37-43. [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Honeypots especializados para Redes de Controlo Industrial", in In Proc. of CIBSI 2013 (Congreso Iberoamericano de Seguridad Informática). ISBN: 978-9962-676-43-0, 2013 [citation][year=2019]Kamlofsky, Jorge & Abdel Masih, Samira & Colombo, Hugo & Milio, Claudio & Hecht, Juan Pedro. (2019). Ciberseguridad en los Sistemas de Control Industrial: Clave para la Ciberdefensa de las Infraestructuras Críticas, in Proc of XXI Workshop de Investigadores en Ciencias de la ComputaciónAt: San Juan, Argentina, maio 2019. [citation][year=2017]J Kamlofsky, SA Masih, H Colombo, D Veiga, E Costa, "Seguridad en Redes las Industriales: Clave para la Ciberdefensa de las Infraestructuras Críticas", in Proc of WICC 2017 - XIX Workshop de Investigadores en Ciencias de la Computación, 27-28 April 2017, Instituto Tecnológico de Buenos Aires (ITBA), Buenos Aires, Argentina. Available at: http://wicc.it.itba.edu.ar/pdf/Libro_WICC_2017_ISBN_978-987-42-5143-5.pdf [citation][year=2016]Kamlofsky, Jorge, et al. "Ciberdefensa en redes industriales." XVIII Workshop de Investigadores en Ciencias de la Computación (WICC 2016, Entre Ríos, Argentina). 2016. [citation][year=2015]Kamlofsky, Jorge, et al. "Ciberdefensa de infraestructuras industriales." XVII Workshop de Investigadores en Ciencias de la Computación (Salta, 2015). 2015. [citation][year=2015]Jorge Kamlofsky, Hugo Colombo, Matías Sliafertas, Juan Pedernera (2015). “Un Enfoque para Disminuir los Efectos de los Ciber-ataques a las Infraestructuras Críticas”. Libro: 3er. Congreso Nacional de Ingeniería Informática / Sistemas de Información CoNaIISI 2015. Organizado por la red de carreras de Ingeniería Informática / Sistemas de Información (RIISIC) perteneciente al CONFEDI. 19 y 20 de Noviembre. UTN, Facultad Regional Buenos Aires. Institución de origen: Facultad de Informática, UNLP. ISBN: 978-987-1896-47-9. Book Chapters 2015(1 publication) [publication]Simões, P. and Tiago Cruz and J. Proenca and Edmundo Monteiro , "Specialized Honeypots for SCADA Systems, in Cyber Security Analytics", in Cyber Security Analytics, Technology and Automation, vol. 1, pp. 251-269, 2015 [citation][year=2020]Cifranic, Nicholas & Romero-Mariona, Jose & Souza, Brian & Hallman, Roger. (2020). Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures, in Proc of 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020)At: Prague, Czech Republic. May 2020 [citation][year=2020]You J., Lv S., Hao Y., Feng X., Zhou M., Sun L. (2020) Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. In: Zhou J., Luo X., Shen Q., Xu Z. (eds) Information and Communications Security. ICICS 2019. Lecture Notes in Computer Science, vol 11999. Springer, Cham. DOI: 10.1007/978-3-030-41579-2_5 [citation][year=2019]C. Dalamagkas, P. Sarigiannidis, D. Ioannidis, E. Iturbe, O. Nikolis, F. Ramos, E. Rios, A. Sarigiannidis and D. Tzovaras, "A Survey On Honeypots, Honeynets And Their Applications On Smart Grid", 1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures, Paris, France, 2019. [citation][year=2019]D. Pliatsios, P. Sarigiannidis, T. Liatifis, K. Rompolos and I. Siniosoglou, "A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure," 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 2019, pp. 1-6. doi: 10.1109/CAMAD.2019.8858431 [citation][year=2017]Dewar, Robert Scott (2017) Cyber security in the European Union: an historical institutionalist analysis of a 21st century security concern. PhD thesis, University of Glasgow. URL: http://theses.gla.ac.uk/8188/ [citation][year=2016]Jose Romero-Mariona, Roger Hallman, Megan Kline, John San Miguel, Maxine Majorand Lawrence Kerr, Security in the Industrial Internet of ThingsTheC-SECApproach, Proc. of the Int. Conf. on Internet of Things and Big Data (IoTBD 2016), pp. 413-420, ISBN: 978-989-758-183-0, 2016, SCITEPRESS [citation][year=2016]Jaehee Lee, Jinhyeok Jeon, Changyeob Lee, Junbeom Lee, Jaebin Cho, An implementation of log visualization system combined SCADA Honeypot, Proc. of the Int. Conf. on Advanced Communications Technology (ICACT2016), pp. 441-444, Phoenix Park, South Korea, Jan 31 – Feb 03, 2016