14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), May 2015
DOI
Cited by
Year 2020 : 2 citations
Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang, PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints, Computers & Security, Volume 92, 2020, 101749, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101749.
Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng. 2020. Ransomware Targeting Automobiles. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec ’20). Association for Computing Machinery, New York, NY, USA, 23–29. DOI:https://doi.org/10.1145/3375706.3380558
Year 2019 : 6 citations
Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306
T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289
D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019.
Khaoula Es-Salhi. Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system. Systems and Control [cs.SY]. Ecole nationale supérieure Mines-Télécom Atlantique, 2019. English. ffNNT : 2019IMTA0143ff. fftel-02298847f. URL: https://tel.archives-ouvertes.fr/tel-02298847/document
Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946.
H. Gao, J. Li and J. Cheng, "Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 289-294.
doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00060
Year 2018 : 6 citations
Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18
P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018
S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022
Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975
T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591.
Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778
Year 2017 : 8 citations
Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477
Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK.
P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23
Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4.
A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886
Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638
Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6
Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9
Year 2016 : 2 citations
Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014
Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/
Year 2015 : 1 citations
P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5.